Ziyi Guan
Photo credit Ronen Goldman

Ziyi Guan

I am a fifth-year Ph.D. student at the EPFL theory group, where I am advised by Alessandro Chiesa and Mika Göös. I received a B.S. in Computer Science and a B.S. in Mathematical Sciences from Carnegie Mellon University in 2020.

I am interested in theoretical computer science, particularly complexity theory, probabilistic proof systems, cryptography, and quantum computing.

Papers

14.
SNARGs for NP from LWE
Ziyi Guan, Eylon Yogev
Note: we have identified a bug in the proof, and we currently do not know how to fix it.
ePrint

We construct the first succinct non-interactive argument (SNARG) for $\mathsf{NP}$ in the common reference string model based solely on the sub-exponential hardness of the learning with errors (LWE) assumption. Our scheme achieves non-adaptive security, partial succinctness with an argument size of $O(n^{0.91})$, and is plausibly post-quantum secure. Previous constructions of SNARGs from falsifiable assumptions either relied on indistinguishability obfuscation or were restricted to idealized models (e.g., the random oracle model or generic group model).

Our construction is also the first to instantiate the Micali transformation (Fiat–Shamir applied to Kilian's protocol) in the standard model with concrete hash functions. We achieve this by developing a new mechanism to securely instantiate the Fiat–Shamir hash function for interactive arguments, overcoming the known barriers that limit standard techniques to interactive proofs. As a result, our scheme refutes “universal” attacks on the Micali framework by demonstrating that there exist concrete instantiations of the underlying components for which the transformation is sound.

Our construction relies on two primitives of independent interest: a PCP with a new property which we term “shadow soundness”, and a lattice-based vector commitment that provides statistical binding with respect to a hidden function.

13.
All Polynomial Generators Preserve Distance with Mutual Correlated Agreement
Sarah Bordage, Alessandro Chiesa, Ziyi Guan, Ignacio Manzur
ePrint

A generator is a function that maps a random seed to a list of coefficients. We study generators that preserve distance to a linear code: the linear combination of any list of vectors using coefficients sampled by the generator has distance to the code no smaller than that of the original vectors, except for a small error. Distance preservation plays a central role in modern probabilistic proofs, and has been formalized in several ways. We study mutual correlated agreement, the strongest known form of distance preservation.

We initiate the systematic study of mutual correlated agreement, aiming to characterize the class of generators with this property. Towards this, we study polynomial generators, a rich class that includes all examples of generators considered in the distance preservation literature. Our main result is that all polynomial generators guarantee mutual correlated agreement for every linear code. This improves on prior work both in generality (the class of generators covered) and in parameters (the error bounds).

We additionally provide new results for the case where the linear code is a Reed–Solomon code, which is of particular interest in applications. We prove that all polynomial generators satisfy mutual correlated agreement for Reed–Solomon codes up to the Johnson bound. In particular, we improve upon the state-of-the-art by Ben-Sasson, Carmon, Ishai, Kopparty, and Saraf (FOCS 2020) and resolve a question posed by Arnon, Chiesa, Fenzi, and Yogev (Eurocrypt 2025).

Along the way we develop a flexible and general toolbox for mutual correlated agreement, and are the first to establish distance preservation for generators that lie beyond polynomial generators.

12.
On the Fiat–Shamir Security of Succinct Arguments from Functional Commitments
Alessandro Chiesa, Ziyi Guan, Christian Knabenhans, Zihan Yu
ZKProof 7, Sofia, Bulgaria
ePrint · talk by Christian

We study the security of a popular paradigm for constructing SNARGs, closing a key security gap left open by prior work. The paradigm consists of two steps: first, construct a public-coin succinct interactive argument by combining a functional interactive oracle proof (FIOP) and a functional commitment scheme (FC scheme); second, apply the Fiat–Shamir transformation in the random oracle model. Prior work did not consider this generalized setting nor prove the security of this second step (even in special cases).

We prove that the succinct argument obtained in the first step satisfies state-restoration security, thereby ensuring that the second step does in fact yield a succinct non-interactive argument. This is provided the FIOP satisfies state-restoration security and the FC scheme satisfies a natural state-restoration variant of function binding (a generalization of position binding for vector commitment schemes).

Moreover, we prove that notable FC schemes satisfy state-restoration function binding, allowing us to establish, via our main result, the security of several SNARGs of interest (in the random oracle model). This includes a security proof of Plonk, in the ROM, based on ARSDH (a falsifiable assumption).

11.
Quantum Rewinding for IOP-Based Succinct Arguments
Alessandro Chiesa, Marcel Dall'Agnol, Zijing Di, Ziyi Guan, Nicholas Spooner
TCC 2025 (23rd Theory of Cryptography Conference)
ePrint · slides

We analyze the post-quantum security of succinct interactive arguments constructed from interactive oracle proofs (IOPs) and vector commitment schemes. We prove that an interactive variant of the BCS transformation is secure in the standard model against quantum adversaries when the vector commitment scheme is collapsing.

Our proof builds on and extends prior work on the post-quantum security of Kilian's succinct interactive argument, which is instead based on probabilistically checkable proofs (PCPs). We introduce a new quantum rewinding strategy that works across any number of rounds.

As a consequence of our results, we obtain standard-model post-quantum secure succinct arguments with the best asymptotic complexity known.

10.
Relativized Succinct Arguments in the ROM Do Not Exist
Annalisa Barbara, Alessandro Chiesa, Ziyi Guan
TCC 2025 (23rd Theory of Cryptography Conference)
ZKProof 7, Sofia, Bulgaria
ePrint · slides

A relativized succinct argument in the random oracle model (ROM) is a succinct argument in the ROM that can prove/verify the correctness of computations that involve queries to the random oracle. We prove that relativized succinct arguments in the ROM do not exist. The impossibility holds even if the succinct argument is interactive, and even if soundness is computational (rather than statistical).

This impossibility puts on a formal footing the commonly-held belief that succinct arguments require non-relativizing techniques. Moreover, our results stand in sharp contrast with other oracle models, for which a recent line of work has constructed relativized succinct non-interactive arguments (SNARGs). Indeed, relativized SNARGs are a powerful primitive that, e.g., can be used to obtain constructions of IVC (incrementally-verifiable computation) and PCD (proof-carrying data) based on falsifiable cryptographic assumptions. Our results rule out this approach for IVC and PCD in the ROM.

9.
Breaking Verifiable Delay Functions in the Random Oracle Model
Ziyi Guan, Artur Riazanov, Weiqiang Yuan
Crypto 2025 (45th Annual International Cryptology Conference)
ePrint · slides · slides by Artur

This work resolves the open problem of whether verifiable delay functions (VDFs) can be constructed in the random oracle model. A VDF is a cryptographic primitive that requires a long time to compute (even with parallelization), but produces a unique output that is efficiently and publicly verifiable.

We prove that VDFs do not exist in the random oracle model. This also rules out black-box constructions of VDFs from other cryptographic primitives, such as one-way functions, one-way permutations and collision-resistant hash functions.

Prior to our work, Mahmoody, Smith and Wu (ICALP 2020) prove that perfectly unique VDFs (a much stronger form of VDFs) do not exist in the random oracle model; on the other hand, Ephraim, Freitag, Komargodski, and Pass (Eurocrypt 2020) construct VDFs in the random oracle model assuming the hardness of repeated squaring. Our result is optimal — we bridge the current gap between previously known impossibility results and existing constructions.

We initiate the study of proof of work functions, a new cryptographic primitive that shares similarities with both VDFs and proof of works. We show that a stronger form of it does not exist in the random oracle model, leaving open the fascinating possibility of a random-oracle-based construction.

8.
Generalised Linial-Nisan Conjecture is False for DNFs
Yaroslav Alekseev, Mika Göös, Ziyi Guan, Gilbert Maystre, Artur Riazanov, Weiqiang Yuan, Dmitry Sokolov
CCC 2025 (40th Computational Complexity Conference)
ECCC

Aaronson (STOC 2010) conjectured that almost k-wise independence fools constant-depth circuits; he called this the generalised Linial-Nisan conjecture. Aaronson himself later found a counterexample for depth-3 circuits. We give here an improved counterexample for depth-2 circuits (DNFs). This shows, for instance, that Bazzi's celebrated result (k-wise independence fools DNFs) cannot be generalised in a natural way. We also propose a way to circumvent our counterexample: We define a new notion of pseudorandomness called local couplings and show that it fools DNFs and even decision lists.

7.
Untangling the Security of Kilian’s Protocol: Upper and Lower Bounds
Alessandro Chiesa, Marcel Dall'Agnol, Ziyi Guan, Nicholas Spooner, Eylon Yogev
TCC 2024 (22nd Theory of Cryptography Conference)
ePrint · slides

Sigma protocols are elegant cryptographic proofs that have become a cornerstone of modern cryptography. A notable example is Schnorr's protocol, a zero-knowledge proof-of-knowledge of a discrete logarithm. Despite extensive research, the security of Schnorr's protocol in the standard model is not fully understood.

In this paper we study Kilian's protocol, an influential public-coin interactive protocol that, while not a sigma protocol, shares striking similarities with sigma protocols. The first example of a succinct argument, Kilian's protocol is proved secure via rewinding, the same idea used to prove sigma protocols secure. In this paper we show how, similar to Schnorr's protocol, a precise understanding of the security of Kilian's protocol remains elusive. We contribute new insights via upper bounds and lower bounds.

  • Upper bounds.

    We establish the tightest known bounds on the security of Kilian's protocol in the standard model, via strict-time reductions and via expected-time reductions. Prior analyses are strict-time reductions that incur large overheads or assume restrictive properties of the PCP underlying Kilian's protocol.

  • Lower bounds.

    We prove that significantly improving on the bounds that we establish for Kilian's protocol would imply improving the security analysis of Schnorr's protocol beyond the current state-of-the-art (an open problem). This partly explains the difficulties in obtaining tight bounds for Kilian's protocol.

6.
Security Bounds for Proof-Carrying Data from Straightline Extractors
Alessandro Chiesa, Ziyi Guan, Shahar Samocha, Eylon Yogev
TCC 2024 (22nd Theory of Cryptography Conference)
ZKProof 7, Sofia, Bulgaria
ePrint · slides

Proof-carrying data (PCD) is a powerful cryptographic primitive that allows mutually distrustful parties to perform distributed computation in an efficiently verifiable manner. Real-world deployments of PCD have sparked keen interest within the applied community and industry.

Known constructions of PCD are obtained by recursively-composing SNARKs or related primitives. Unfortunately, known security analyses incur expensive blowups, which practitioners have disregarded as the analyses would lead to setting parameters that are prohibitively expensive.

In this work we study the concrete security of recursive composition, with the goal of better understanding how to reasonably set parameters for certain PCD constructions of practical interest. Our main result is that PCD obtained from SNARKs with straightline knowledge soundness has essentially the same security as the underlying SNARK (i.e., recursive composition incurs essentially no security loss).

We describe how straightline knowledge soundness is achieved by SNARKs in several oracle models, which results in a highly efficient security analysis of PCD that makes black-box use of the SNARK's oracle (there is no need to instantiated the oracle to carry out the security reduction).

As a notable application, our work offers an idealized model that provides new, albeit heuristic, insights for the concrete security of recursive STARKs used in blockchain systems. Our work could be viewed as partial evidence justifying the parameter choices for recursive STARKs made by practitioners.

5.
Quantum and Classical Communication Complexity of Permutation-Invariant Functions
Ziyi Guan, Yunqi Huang, Penghui Yao, Zekun Ye
STACS 2024 (41st International Symposium on Theoretical Aspects of Computer Science)
IEEE Transactions on Information Theory
arXiv

This paper gives a nearly tight characterization of the quantum communication complexity of the permutation-invariant Boolean functions. With such a characterization, we show that the quantum and randomized communication complexity of the permutation-invariant Boolean functions are quadratically equivalent (up to a logarithmic factor). Our results extend a recent line of research regarding query complexity to communication complexity, showing symmetry prevents exponential quantum speedups.

Furthermore, we show the Log-rank Conjecture holds for any non-trivial total permutation-invariant Boolean function. Moreover, we establish a relationship between the quantum/classical communication complexity and the approximate rank of permutation-invariant Boolean functions. This implies the correctness of the Log-approximate-rank Conjecture for permutation-invariant Boolean functions in both randomized and quantum settings (up to a logarithmic factor).

4.
On Parallel Repetition of PCPs
Alessandro Chiesa, Ziyi Guan, Burcu Yıldız
ITCS 2024 (15th Innovations in Theoretical Computer Science)
ePrint · slides

Parallel repetition refers to a set of valuable techniques used to reduce soundness error of probabilistic proofs while saving on certain efficiency measures. Parallel repetition has been studied for interactive proofs (IPs) and multi-prover interactive proofs (MIPs). In this paper, we initiate the study of parallel repetition for probabilistically checkable proofs (PCPs).

We show that, perhaps surprisingly, parallel repetition of a PCP can increase soundness error, in fact bringing the soundness error to one as the number of repetitions tends to infinity. This "failure" of parallel repetition is common: we find that it occurs for a wide class of natural PCPs for NP-complete languages. We explain this unexpected phenomenon by providing a characterization result: the parallel repetition of a PCP brings the soundness error to zero if and only if a certain "MIP projection" of the PCP has soundness error strictly less than one. We show that our characterization is tight via a suitable example. Moreover, for those cases where parallel repetition of a PCP does bring the soundness error to zero, the aforementioned connection to MIPs offers preliminary results on the rate of decay of the soundness error.

Finally, we propose a simple variant of parallel repetition, called consistent parallel repetition (CPR), which has the same randomness complexity and query complexity as the plain variant of parallel repetition. We show that CPR brings the soundness error to zero for every PCP (with non-trivial soundness error). In fact, we show that CPR decreases the soundness error at an exponential rate in the repetition parameter.

3.
Depth-3 Circuits for Inner-Product
Mika Göös, Ziyi Guan, Tiberiu Mosnoi
MFCS 2023 (48th International Symposium on Mathematical Foundations of Computer Science)
Information and Computation (invited to special issue on MFCS 2023)
ECCC · slides

What is the Σ32-circuit complexity (depth 3, bottom-fanin 2) of the 2n-bit inner product function? The complexity is known to be exponential 2αnn for some αn=Ω(1). We show that the limiting constant α≔limsup αn satisfies:

0.847... ≤ α ≤ 0.965...

Determining α is one of the seemingly-simplest open problems about depth-3 circuits. The question was recently raised by Golovnev, Kulikov, and Williams (ITCS 2021) and Frankl, Gryaznov, and Talebanfard (ITCS 2022), who observed that α ∈ [0.5, 1]. To obtain our improved bounds, we analyze a covering LP that captures the Σ32-complexity up to polynomial factors. In particular, our lower bound is proved by constructing a feasible solution to the dual LP.

2.
On the Security of Succinct Interactive Arguments from Vector Commitments

We study the security of a fundamental family of succinct interactive arguments in the standard model, stemming from the works of Kilian (1992) and Ben-Sasson, Chiesa, and Spooner (``BCS'', 2016). These constructions achieve succinctness by combining probabilistic proofs and vector commitments.

Our first result concerns the succinct interactive argument of Kilian, realized with any probabilistically-checkable proof (PCP) and any vector commitment. We establish the tightest known bounds on the security of this protocol. Prior analyses incur large overheads, or assume restrictive properties of the underlying PCP.

Our second result concerns an interactive variant of the BCS succinct non-interactive argument, which here we call IBCS, realized with any public-coin interactive oracle proof (IOP) and any vector commitment. We establish the first security bounds for the IBCS protocol. Prior works rely upon this protocol without proving its security; our result closes this gap.

Finally, we study the capabilities and limitations of succinct arguments based on vector commitments. We show that a generalization of the IBCS protocol, which we call the Finale protocol, is secure when realized with any public-query IOP (a notion that we introduce) that satisfies a natural ``random continuation sampling'' (RCS) property. We also show a partial converse: if the Finale protocol satisfies the RCS property (which in particular implies its security), then so does the underlying public-query IOP.

1.
Linear-Time Probabilistic Proofs with Sublinear Verification for Algebraic Automata Over Every Field

Interactive oracle proofs (IOPs) are a generalization of probabilistically checkable proofs that can be used to construct succinct arguments. Improvements in the efficiency of IOPs lead to improvements in the efficiency of succinct arguments. Key efficiency goals include achieving provers that run in linear time and verifiers that run in sublinear time, where the time complexity is with respect to the arithmetic complexity of proved computations over a finite field 𝔽.

We consider the problem of constructing IOPs for any given finite field 𝔽 with a linear-time prover and polylogarithmic query complexity. Several previous works have achieved these efficiency requirements with O(1) soundness error for NP-complete languages. However, constrained by the soundness error of the sumcheck protocol underlying these constructions, the IOPs achieve linear prover time only for instances in fields of size (log n). Prior work (Ron-Zewi and Rothblum, STOC 2022) overcomes this problem, but with linear verification time.

We construct IOPs for the algebraic automata problem over any finite field 𝔽 with a linear-time prover, polylogarithmic query complexity, and sublinear verification complexity. We additionally prove a similar result to Ron-Zewi and Rothblum for the NP-complete language R1CS using different techniques. The IOPs imply succinct arguments for (nondeterministic) arithmetic computations over any finite field with linear-time proving (given black-box access to a linear-time collision-resistant hash function).

Inspired by constructions of reverse-multiplication-friendly embeddings, our IOP constructions embed problem instances over small fields into larger fields and adapt previous IOP constructions to the new instances. The IOP provers are modeled as random access machines and use precomputation techniques to achieve linear prover time. In this way, we avoid having to replace the sumcheck protocol.

Talks

9.
Relativized Succinct Arguments in the ROM Do Not Exist
[slides]
Aarhus · TCC 2025 · Dec 2, 2025
EPFL · Swiss Crypto Day · Oct 31, 2025
Sofia · ZKProof 7 · Mar 24, 2025 [video]
8.
Breaking Verifiable Delay Functions in the Random Oracle Model
[slides]
New York University · Crypto & Sec Seminar· Sep 9, 2025
MIT · Cryptography and Information Security Seminar · Sep 5, 2025
Cornell University· Theory Seminar · Aug 27, 2025
UCSB · Crypto 2025 · Aug 18, 2025
Aarhus University · NordiCrypt Summer · June 30, 2025
7.
On the Security of Succinct Arguments from Probabilistic Proofs
[slides] [abstract]
Boston University · Security Seminar · Sep 3, 2025
Carnegie Mellon University · CyLab Crypto Seminar · Aug 28, 2025 [video]
Aarhus University · June 26, 2025
ETH Zurich · May 19, 2025

Succinct arguments are fundamental cryptographic primitives with wide-ranging applications. A common approach to build succinct arguments is from probabilistic proofs, dating back to Kilian’s protocol that combines a PCP and a Merkle tree.

In this talk, I will present the tightest bound on the regular security of Kilian’s protocol and show how to obtain similar bounds for more general argument systems, such as those based on polynomial commitment schemes. I’ll conclude with results that achieve post-quantum security and Fiat-Shamir security for general classes of arguments.

6.
Quantum Rewinding for IOP-Based Succinct Arguments
[slides]
ENS · Paris ZK Day · June 9, 2025
University of Zurich · Workshop on post-quantum cryptography · June 3, 2025
Bocconi University · May 29, 2025
5.
Security Bounds for Proof-Carrying Data from Straightline Extractors
[slides]
Sofia · ZKProof 7 · Mar 24, 2025 [video]
Bocconi University · TCC 2024 · Dec 4, 2024
University of St.Gallen · Swiss Crypto Day · Sep 2, 2024
ETH Zurich · CrossFyre · May 25, 2024
Carnegie Mellon University · Crypto Seminar · Mar 21, 2024 [video]
4.
Untangling the Security of Kilian’s Protocol: Upper and Lower Bounds
[slides]
Bocconi University · TCC 2024 · Dec 3, 2024
3.
On the Security of Succinct Interactive Arguments from Vector Commitments
[slides]
New York University · Crypto Reading Group · February 21, 2024
King’s College London · CYS Research Seminar · February 7, 2024
Bar-Ilan University · Crypto Seminar · January 25, 2024
2.
On Parallel Repetition of PCPs
[slides]
University of Cambridge · Algorithms and Complexity Seminar · February 5, 2024
Bocconi University · Bocconi Seminar · January 24, 2024
Nanjing University · Theory Seminar · November 22, 2023
1.
Depth-3 Circuits for Inner-Product
[slides]
Bordeaux INP · MFCS 2023 · August 31, 2023

Supervising

Yuetian Wu (Peking University)
Jun 2025 – present · Summer @ EPFL
Parsa Tasbihgou (EPFL)
Sep 2024 – Feb 2025 · Master Semester Project
Sebastian Simon (Princeton University)
Jul 2024 – Feb 2025 · Summer @ EPFL
Mathias Marty (EPFL)
Nov 2023 – Jun 2024 · EPFL Master’s Thesis · On State-Restoration Knowledge Soundness from Special Soundness
Annalisa Barbara (Bocconi University)
Jun 2023 – Jun 2024 · Summer @ EPFL
Keming Ouyang (University of Michigan, Ann Arbor)
Jun 2023 – Sep 2023 · Summer @ EPFL
Burcu Yıldız (EPFL, Master in Computer Science → EPFL Ph.D. student in Computer Science)
Sep 2024 – Feb 2025 · EPFL Master’s Thesis · On Parallel Repetition of MIPs
Sep 2023 – Jun 2024 · EPFL Research Scholar
Mar 2023 – Sep 2023 · Master Semester Project
Nikolaos Efthymiou (EPFL)
Jan 2023 – Jun 2023 · Master Semester Project
Zihan Yu (EPFL, Master in Computer Science → Yale University Ph.D. student in Computer Science)
Sep 2024 – Feb 2025 · EPFL Master’s Thesis · On the Fiat-Shamir Security of FIOP-Based Succinct Arguments
Nov 2023 – Sep 2024 · Master Optional Semester Project
Jan 2022 – Jun 2022 · Master Semester Project
Andrea Byku (ETH Zurich)
Jan 2022 – Jun 2022 · Master Semester Project

Teaching

Spring 2026
Co-instructor·Theory of Computation·EPFL
Spring 2025
Head Teaching Assistant·Theory of Computation·EPFL
Spring 2024
Head Teaching Assistant·Theory of Computation·EPFL
Fall 2023
Teaching Assistant·Foundation of Probabilistic Proofs·EPFL
Summer 2023
Teaching Assistant·Foundations and Frontiers of Probabilistic Proofs·Zurich, Switzerland
Spring 2023
Teaching Assistant·Theory of Computation·EPFL
Fall 2022
Teaching Assistant·Foundation of Probabilistic Proofs·EPFL
Spring 2022
Teaching Assistant·Foundation of Probabilistic Proofs·EPFL
Fall 2020
Teaching Assistant·Great Ideas in Theoretical Computer Science·Carnegie Mellon University
Spring 2020
Teaching Assistant·Continuous Time Finance·Carnegie Mellon University
Spring 2020
Tutor·Great Ideas in Theoretical Computer Science·Carnegie Mellon University
Fall 2019
Teaching Assistant·Discrete Time Finance·Carnegie Mellon University
Spring 2019
Teaching Assistant·Integration and Approximation·Carnegie Mellon University