
Briefing
The foundational problem of secure multi-party computation and zero-knowledge proofs is the efficient, consistent generation of cryptographic correlations across multiple interactions. This research introduces Committed Vector Oblivious Linear Evaluation (C-VOLE), a novel primitive that allows a party to pre-commit to a vector and then generate VOLE correlations with multiple other parties on that same committed value, fundamentally enforcing strong input consistency across diverse computations. This mechanism transforms the efficiency of complex protocols, enabling practical, multi-use cryptographic commitments and setting a new architectural standard for secure computation and private data sharing in decentralized systems.

Context
Prior to this work, the primary theoretical limitation in constructing efficient, multi-use cryptographic protocols was the high cost and complexity of ensuring a party’s input remained consistent across multiple secure computations. Standard Vector Oblivious Linear Evaluation (VOLE) is a powerful building block, yet it was not designed to cryptographically bind a sender’s input to a commitment that could be repeatedly and securely leveraged by different receivers or in subsequent protocol rounds without re-execution or significant overhead. This forced complex applications, such as Private Set Intersection (PSI) between a server and many clients, to either incur prohibitive communication costs or compromise on the rigor of input consistency guarantees.

Analysis
C-VOLE fundamentally re-architects the VOLE primitive by introducing a commitment layer. In the standard VOLE model, a sender holds vectors (mathbfa, mathbfb) and a receiver holds a scalar x, learning mathbfa · x + mathbfb without revealing x to the sender or mathbfa, mathbfb to the receiver. C-VOLE extends this by requiring the sender to first commit to the vectors (mathbfa, mathbfb) using an efficient commitment scheme. The core breakthrough is that this commitment is designed to be reusable and verifiable by multiple parties.
A receiver can then execute the VOLE protocol with the sender, and the resulting correlation is cryptographically guaranteed to be based on the sender’s original, committed vectors. This separation of the commitment phase from the correlation generation phase enables a single, costly setup to serve numerous subsequent, low-cost private computations, thereby amortizing the overhead and ensuring systemic consistency.

Parameters
- ZK Proof Communication Reduction ∞ 28x reduction in communication overhead for Zero-Knowledge Proofs compared to previous methods.
- Crowd PSI Communication Reduction ∞ 35x reduction in communication overhead for Private Set Intersection protocols with multiple clients.
- Security Basis ∞ Learning Parity with Noise (LPN) assumption.

Outlook
The C-VOLE primitive establishes a critical new building block for the next generation of privacy-preserving applications, particularly those requiring a high degree of input consistency across many users or services. In the next three to five years, this will unlock highly efficient, multi-client Private Set Intersection for decentralized identity systems and regulatory compliance, and accelerate the performance of Zero-Knowledge Virtual Machines (zkVMs) by making their underlying cryptographic commitments significantly cheaper and reusable. This research opens new avenues for exploring cryptographic systems that optimize for multi-party, multi-session security, moving beyond single-session protocols.

Verdict
The introduction of Committed Vector Oblivious Linear Evaluation represents a foundational advance in cryptographic efficiency, providing the necessary primitive to scale multi-party computation protocols to a practical, systemic level.
