Search papers, labs, and topics across Lattice.
This paper introduces a novel sheaf-theoretic framework for formalizing cryptographic security, using Grothendieck topologies to model attacker observations and sheaf theory to represent protocol transcripts. The authors demonstrate that Σ-protocol transcripts form torsors in the associated topos of sheaves, where zero-knowledge corresponds to local triviality and soundness to the absence of global sections. They illustrate this framework with a concrete analysis of the Schnorr Σ-protocol, providing a geometric interpretation of simulation-based security.
Cryptographic security gets a geometric makeover: zero-knowledge proofs are now torsors in a topos, revealing a surprising connection between abstract algebra and attacker models.
Cryptographic security is traditionally formulated using game-based or simulation-based definitions. In this paper, we propose a structural reformulation of cryptographic security based on Grothendieck topologies and sheaf theory. Our key idea is to model attacker observations as a Grothendieck site, where covering families represent admissible decompositions of partial information determined by efficient simulation. Within this framework, protocol transcripts naturally form sheaves, and security properties arise as geometric conditions. As a first step, we focus on $Σ$-protocols. We show that the transcript structure of any $Σ$-protocol defines a torsor in the associated topos of sheaves. Local triviality of this torsor corresponds to zero-knowledge, while the absence of global sections reflects soundness. A concrete analysis of the Schnorr $Σ$-protocol is provided to illustrate the construction. This sheaf-theoretic perspective offers a conceptual explanation of simulation-based security and suggests a geometric foundation for further cryptographic abstractions.