Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Quasi-Adaptive NIZK for Linear Subspaces Revisited - MaRDI portal

Quasi-Adaptive NIZK for Linear Subspaces Revisited

From MaRDI portal
Publication:2948380

DOI10.1007/978-3-662-46803-6_4zbMath1326.94103OpenAlexW835751452WikidataQ59163651 ScholiaQ59163651MaRDI QIDQ2948380

Eike Kiltz, Hoeteck Wee

Publication date: 30 September 2015

Published in: Advances in Cryptology - EUROCRYPT 2015 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-662-46803-6_4




Related Items (45)

A New Paradigm for Public-Key Functional Encryption for Degree-2 PolynomialsHierarchical Identity-Based Encryption with Tight Multi-challenge SecurityOn Black-Box Extensions of Non-interactive Zero-Knowledge Arguments, and Signatures Directly from Simulation SoundnessOn QA-NIZK in the BPK ModelSmooth NIZK argumentsQA-NIZK Arguments of Same Opening for Bilateral CommitmentsSignatures of Knowledge for Boolean Circuits Under Standard AssumptionsParameter-hiding order revealing encryptionSignatures of knowledge for Boolean circuits under standard assumptionsSubversion-resistant quasi-adaptive NIZK and applications to modular zk-SNARKsSurvey of information securityShort, invertible elements in partially splitting cyclotomic rings and applications to lattice-based zero-knowledge proofsHardware security without secure hardware: how to decrypt with a password and a serverImproved, black-box, non-malleable encryption from semantic securityQANIZK for adversary-dependent languages and their applicationsEfficient IBE with Tight Reduction to Standard Assumption in the Multi-challenge SettingAlmost tight multi-user security under adaptive corruptions \& leakages in the standard modelTight lower bounds and optimal constructions of anonymous broadcast encryption and authenticationA Revocable Group Signature Scheme with Scalability from Simple Assumptions and Its ImplementationThe Kernel Matrix Diffie-Hellman AssumptionNIWI and new notions of extraction for algebraic languagesTraceable receipt-free encryptionGentry-Wichs is tight: a falsifiable non-adaptively sound SNARGSmooth zero-knowledge hash functionsCRS-updatable asymmetric quasi-adaptive NIZK argumentsShorter quasi-adaptive NIZK proofs for linear subspacesImpossibilities in succinct arguments: black-box extraction and moreStatistical ZAPs from group-based assumptionsFully-succinct publicly verifiable delegation from constant-size assumptionsAdaptively secure non-interactive CCA-secure threshold cryptosystems: generic framework and constructionsAn algebraic framework for Diffie-Hellman assumptionsImproved Structure Preserving Signatures Under Standard Bilinear AssumptionsEquivalences and Black-Box Separations of Matrix Diffie-Hellman ProblemsElection control through social influence with unknown preferencesFine-grained secure attribute-based encryptionUnbounded inner product functional encryption from bilinear mapsTightly secure hierarchical identity-based encryptionMinicrypt primitives with algebraic structure and applicationsCompact NIZKs from standard assumptions on bilinear mapsNew constructions of statistical NIZKs: dual-mode DV-NIZKs and moreTightly CCA-secure inner product functional encryption schemeNew Techniques for Non-interactive Shuffle and Range ArgumentsStructure-preserving public-key encryption with leakage-resilient CCA securityShorter non-interactive zero-knowledge arguments and ZAPs for algebraic languagesAdaptive Partitioning




This page was built for publication: Quasi-Adaptive NIZK for Linear Subspaces Revisited