On adaptive security of delayed-input sigma protocols and Fiat-Shamir NIZKs
From MaRDI portal
Publication:2106675
DOI10.1007/978-3-030-57990-6_33zbMath1506.94034OpenAlexW3046921815MaRDI QIDQ2106675
Roberto Parisella, Michele Ciampi, Daniele Venturi
Publication date: 16 December 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-57990-6_33
Related Items (11)
Does Fiat-Shamir require a cryptographic hash function? ⋮ Non-interactive batch arguments for NP from standard assumptions ⋮ One-shot Fiat-Shamir-based NIZK arguments of composite residuosity and logarithmic-size ring signatures in the standard model ⋮ Rational Modular Encoding in the DCR Setting: Non-interactive Range Proofs and Paillier-Based Naor-Yung in the Standard Model ⋮ Four-round black-box non-malleable schemes from one-way permutations ⋮ DAG-\( \Sigma \): a DAG-based sigma protocol for relations in CNF ⋮ Triply adaptive UC NIZK ⋮ PPAD is as hard as LWE and iterated squaring ⋮ Oblivious transfer from trapdoor permutations in minimal rounds ⋮ Simulatable verifiable random function from the LWE assumption ⋮ Non-interactive CCA2-secure threshold cryptosystems: achieving adaptive security in the standard model without pairings
This page was built for publication: On adaptive security of delayed-input sigma protocols and Fiat-Shamir NIZKs