Shorter quasi-adaptive NIZK proofs for linear subspaces
From MaRDI portal
Publication:1698397
DOI10.1007/s00145-016-9243-7zbMath1386.94078OpenAlexW2530441704WikidataQ113906168 ScholiaQ113906168MaRDI QIDQ1698397
Publication date: 15 February 2018
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-016-9243-7
signaturesbilinear pairingsSXDHDLINdual-system IBEGroth-Sahai NIZKsquasi-adaptive non-interactive zero-knowledge (NIZK) proofs
Related Items (10)
Subversion-resistant quasi-adaptive NIZK and applications to modular zk-SNARKs ⋮ CCA-secure ABE using tag and pair encoding ⋮ On black-box extension of a non-interactive zero-knowledge proof system for secret equality ⋮ DAG-\( \Sigma \): a DAG-based sigma protocol for relations in CNF ⋮ A Generic Construction of Integrated Secure-Channel Free PEKS and PKE ⋮ Non-interactive composition of sigma-protocols via Share-then-Hash ⋮ Revocable identity-based encryption with bounded decryption key exposure resistance: lattice-based construction and more ⋮ Adaptively secure revocable hierarchical IBE from \(k\)-linear assumption ⋮ Tag-based ABE in prime-order groups via pair encoding ⋮ Compact NIZKs from standard assumptions on bilinear maps
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Dual-System Simulation-Soundness with Applications to UC-PAKE and More
- Compactly Hiding Linear Spans
- An Algebraic Framework for Diffie-Hellman Assumptions
- Shorter Quasi-Adaptive NIZK Proofs for Linear Subspaces
- Switching Lemma for Bilinear Tests and Constant-Size NIZK Proofs for Linear Subspaces
- Tools for Simulating Features of Composite Order Bilinear Groups in the Prime Order Setting
- Relatively-Sound NIZKs and Password-Based Key-Exchange
- Efficient (Anonymous) Compact HIBE from Standard Assumptions
- Disjunctions for Hash Proof Systems: New Constructions and Applications
- Quasi-Adaptive NIZK for Linear Subspaces Revisited
- Round-Optimal Password-Based Authenticated Key Exchange
- Quantum Communication Attacks on Classical Cryptographic Protocols
- Non-interactive and Re-usable Universally Composable String Commitments with Adaptive Security
- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
- Structure-Preserving Signatures and Commitments to Group Elements
- Homomorphic Encryption and Signatures from Vector Decomposition
- Secure Hybrid Encryption from Weakened Key Encapsulation
- A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks
- Hierarchical Predicate Encryption for Inner-Products
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- New directions in cryptography
- Shorter IBE and Signatures via Asymmetric Pairings
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology – CRYPTO 2004
- Non-malleability from Malleability: Simulation-Sound Quasi-Adaptive NIZK Proofs and CCA2-Secure Encryption from Homomorphic Signatures
- Efficient Non-interactive Proof Systems for Bilinear Groups
- Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures
This page was built for publication: Shorter quasi-adaptive NIZK proofs for linear subspaces