How to prove false statements: Practical attacks on Fiat-Shamir
Impact on Bitcoin, Ethereum, and Crypto Systems
- Several commenters say the attack does not let you fake Bitcoin or base-layer Ethereum transactions; Schnorr signatures and basic consensus are not obviously threatened.
- The concern is mainly for zero-knowledge (ZK) systems and rollups, especially some newer Ethereum L2s and bridges that use GKR-based proofs.
- ZK-based protocols on top of blockchains are seen as experimental; this work reinforces that risk.
- Some argue major blockchains are effectively massive bug bounties: a simple catastrophic break would likely already have been exploited, but targeted protocol-level flaws (e.g., in bridges) remain realistic.
Fiat–Shamir, Zero-Knowledge, and the Random Oracle Model
- Multiple explanations: interactive zero-knowledge proofs rely on random challenges; Fiat–Shamir replaces interaction with hashes interpreted as “random oracles.”
- Historically, known breaks of Fiat–Shamir were contrived toy protocols; this paper is notable because it targets a real protocol (GKR).
- The attack shows one can construct a statement/program so that, with Fiat–Shamir, a verifier accepts false statements, even though the interactive version is sound.
Debate: Are Hashes “Randomness”?
- One camp insists hashes should only be integrity labels; treating them as randomness is a misuse and this paper is a predictable failure mode.
- Others counter that cryptographic hashes are explicitly designed to behave like pseudorandom functions and underpin CSPRNGs, signatures, key derivation, etc.
- Long subthread clarifies:
- Hashes are deterministic and don’t create entropy, but can scramble existing entropy into outputs that are indistinguishable from random for many purposes.
- Modern CSPRNGs and signature schemes routinely rely on this property; rejecting hashes as randomness implies rejecting much of modern crypto.
Understanding the Attack’s Core Idea
- The malicious “program” is functionally identical on all normal inputs but is crafted to exploit how Fiat–Shamir hashes the statement/program to derive challenges.
- By embedding knowledge of the hash-function behavior for the protocol’s specific inputs, the prover can fabricate accepting proofs for claims that are actually false.
- Commenters stress: the novelty is not just “if you use a malicious program, you’re in trouble,” but that a relatively simple, efficient construction breaks a widely trusted heuristic.
Reception of the Quanta Article and Communication Issues
- Several readers found the original paper clearer than the Quanta piece, criticizing the article as sensational (“prove lies”) and light on technical detail.
- Some defend Quanta as a generally good pop-science outlet that sometimes overhypes to reach lay readers.
- The homework-grading analogy is seen as imperfect but useful; it spawns a side discussion on probability vs certainty in proofs and in education.
Truth, Lies, and Philosophy Side-Thread
- Extended digression on what constitutes a “lie” and different theories of truth (correspondence, coherence, consensus, pragmatic).
- Others note this is largely orthogonal: in cryptography, “false statement” has a precise, mathematical meaning, and that’s what the paper addresses.