The algebraic group model and its applications

From MaRDI portal
Publication:1784081

DOI10.1007/978-3-319-96881-0_2zbMath1430.94068OpenAlexW2884510571MaRDI QIDQ1784081

Julian Loss, Georg Fuchsbauer, Eike Kiltz

Publication date: 26 September 2018

Full work available at URL: https://doi.org/10.1007/978-3-319-96881-0_2




Related Items

Two-round trip Schnorr multi-signatures via delinearized witnessesMuSig2: simple two-round Schnorr multi-signaturesTighter security for Schnorr identification and signatures: a high-moment forking lemma for \({\varSigma }\)-protocols\textsf{Halo Infinite}: proof-carrying data from additive polynomial commitmentsAn algebraic framework for universal and updatable SNARKsNon-interactive half-aggregation of EdDSA and variants of Schnorr signaturesUpdateable Inner Product Argument with Logarithmic Verifier and ApplicationsOn QA-NIZK in the BPK ModelTight state-restoration soundness in the algebraic group modelNon-malleable codes for bounded parallel-time tamperingFine-grained secure attribute-based encryptionComposition with knowledge assumptionsAnother look at extraction and randomization of Groth's zk-SNARKVersatile and sustainable timed-release encryption and sequential time-lock puzzles (extended abstract)One-more unforgeability of blind ECDSASubversion-resistant quasi-adaptive NIZK and applications to modular zk-SNARKsThe multi-base discrete logarithm problem: tight reductions and non-rewinding proofs for Schnorr identification and signaturesGuaranteed output in \(O(\sqrt{n})\) rounds for round-robin sampling protocolsFiat-Shamir bulletproofs are non-malleable (in the algebraic group model)Optimal tightness for chain-based unique signaturesA fast and simple partially oblivious PRF, with applicationsShort pairing-free blind signatures with exponential securityA Unified Framework for Non-universal SNARKsECLIPSE: Enhanced Compiling Method for Pedersen-Committed zkSNARK EnginesThe One-More Discrete Logarithm Assumption in the Generic Group ModelChain Reductions for Multi-signatures and the HBMS SchemePlumo: an ultralight blockchain clientWitness-succinct universally-composable SNARKsSpartan and bulletproofs are simulation-extractable (for free!)Tracing a linear subspace: application to linearly-homomorphic group signaturesGeneric models for group actionsThreshold and multi-signature schemes from linear hash functionsRevisiting BBS signaturesRai-Choo! Evolving blind signatures to the next levelPI-Cut-Choo and friends: compact blind signatures via parallel instance cut-and-choose and moreHalf-aggregation of Schnorr signatures with tight reductionsOn pairing-free blind signature schemes in the algebraic group modelCounting vampires: from univariate sumcheck to updatable ZK-SNARKPointcheval-Sanders signature-based synchronized aggregate signatureNIWI and new notions of extraction for algebraic languagesWhat makes Fiat-Shamir zkSNARKs (updatable SRS) simulation extractable?Non-interactive Mimblewimble transactions, revisitedMemory-tight multi-challenge security of public-key encryptionFine-grained non-interactive key-exchange: constructions and lower boundsOn time-lock cryptographic assumptions in abelian hidden-order groups\(\mathcal{Lunar}\): a toolbox for more efficient universal and updatable zkSNARKs and commit-and-prove extensionsGentry-Wichs is tight: a falsifiable non-adaptively sound SNARGProofs for inner pairing products and applicationsSnarky ceremoniesAlgebraic adversaries in the universal composability frameworkSmooth zero-knowledge hash functionsSuccinct publicly-certifiable proofs. Or, can a blockchain verify a designated-verifier proof?To label, or not to label (in generic groups)Better than advertised security for non-interactive threshold signaturesThe price of verifiability: lower bounds for verifiable random functionsCRS-updatable asymmetric quasi-adaptive NIZK argumentsBeyond Uber: instantiating generic groups via PGGsLinear-map vector commitments and their practical applicationsPointProofs, revisitedAn analysis of the algebraic group model\textsf{Bingo}: adaptivity and asynchrony in verifiable secret sharing and distributed key generationFully adaptive Schnorr threshold signaturesSnowblind: a threshold blind signature in pairing-free groupsPractical Schnorr threshold signatures without the algebraic group modelAlgebraic reductions of knowledgeSuccinct functional commitment for a large class of arithmetic circuitsPractical dynamic group signatures without knowledge extractorsNon-malleable time-lock puzzles and applicationsFine-grained secure attribute-based encryptionOn subversion-resistant SNARKsMarlin: preprocessing zkSNARKs with universal and updatable SRSEverybody's a target: scalability in public-key encryptionA classification of computational assumptions in the algebraic group modelA non-PCP approach to succinct quantum-safe zero-knowledgeGenerically speeding-up repeated squaring is equivalent to factoring: sharp thresholds for all generic-ring delay functionsShorter non-interactive zero-knowledge arguments and ZAPs for algebraic languagesOn the memory-tightness of hashed ElGamalBlind Schnorr signatures and signed ElGamal encryption in the algebraic group modelOn instantiating the algebraic group model from falsifiable assumptions