Square Span Programs with Applications to Succinct NIZK Arguments

From MaRDI portal
Publication:2938864

DOI10.1007/978-3-662-45611-8_28zbMath1306.94042OpenAlexW945570858MaRDI QIDQ2938864

Jens Groth, George Danezis, Markulf Kohlweiss, Cédric Fournet

Publication date: 16 January 2015

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-662-45611-8_28




Related Items (30)

Updateable Inner Product Argument with Logarithmic Verifier and ApplicationsOn QA-NIZK in the BPK ModelSuccinct non-interactive arguments via linear interactive proofsSignatures of knowledge for Boolean circuits under standard assumptionsSomewhere statistically binding commitment schemes with applicationsSubversion-resistant quasi-adaptive NIZK and applications to modular zk-SNARKsA Unified Framework for Non-universal SNARKsVerifiably-Extractable OWFs and Their Applications to Subversion Zero-KnowledgeScalable zero knowledge via cycles of elliptic curvesA Shuffle Argument Secure in the Generic ModelObtaining simulation extractable NIZKs in the updatable CRS model genericallyUnconditionally secure NIZK in the fine-grained settingWhat makes Fiat-Shamir zkSNARKs (updatable SRS) simulation extractable?Multikey Fully Homomorphic Encryption and ApplicationsGentry-Wichs is tight: a falsifiable non-adaptively sound SNARGSnarky ceremoniesSuccinct publicly-certifiable proofs. Or, can a blockchain verify a designated-verifier proof?Zero-knowledge succinct non-interactive arguments of knowledge based on sets of polynomialsCRS-updatable asymmetric quasi-adaptive NIZK argumentsThe hunting of the SNARKFully-succinct publicly verifiable delegation from constant-size assumptionsUnnamed ItemAn Introduction to the Use of zk-SNARKs in BlockchainsNo-signaling linear PCPsNo-signaling linear PCPsOn subversion-resistant SNARKsCompact NIZKs from standard assumptions on bilinear mapsPinocchio-Based Adaptive zk-SNARKs and Secure/Correct Adaptive Function EvaluationOptimally Sound Sigma Protocols Under DCRAOn succinct arguments and witness encryption from groups


Uses Software



This page was built for publication: Square Span Programs with Applications to Succinct NIZK Arguments