Constant-Size Commitments to Polynomials and Their Applications

From MaRDI portal
Publication:3058656

DOI10.1007/978-3-642-17373-8_11zbMath1253.94054OpenAlexW1909324101MaRDI QIDQ3058656

Ian Goldberg, Gregory M. Zaverucha, Aniket Kate

Publication date: 7 December 2010

Published in: Advances in Cryptology - ASIACRYPT 2010 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-17373-8_11




Related Items (63)

\textsf{Halo Infinite}: proof-carrying data from additive polynomial commitmentsAn algebraic framework for universal and updatable SNARKsVerifiable Inner Product Encryption SchemeUC Updatable Databases and ApplicationsTime- and space-efficient arguments from groups of unknown orderImproved threshold signatures, proactive secret sharing, and input certification from LSS isomorphismsHigh-threshold AVSS with optimal communication complexityConstant Size Ring Signature Without Random OracleDecentralized policy-hiding ABE with receiver privacyGuaranteed output in \(O(\sqrt{n})\) rounds for round-robin sampling protocolsFamilies of SNARK-friendly 2-chains of elliptic curvesGemini: elastic SNARKs for diverse environmentsStoring and Retrieving Secrets on a BlockchainImproved Constructions of Anonymous Credentials from Structure-Preserving Signatures on Equivalence ClassesPolynomial IOPs for Linear Algebra RelationsECLIPSE: Enhanced Compiling Method for Pedersen-Committed zkSNARK EnginesSnarkPack: practical SNARK aggregationSoK: blockchain light clientsWitness-succinct universally-composable SNARKsHyperPlonk: Plonk with linear-time prover and high-degree custom gatesA survey of elliptic curves for proof systemsProving knowledge of isogenies: a surveyFunctional commitments for all functions, with transparent setup and from SISSuccinct vector, polynomial, and functional commitments from latticesPrivate polynomial commitments and applications to MPC\textsf{Dew}: a transparent constant-sized polynomial commitment schemeLattice-based SNARKs: publicly verifiable, preprocessing, and recursively composable (extended abstract)Structure-preserving signatures on equivalence classes and constant-size anonymous credentialsKDM security for the Fujisaki-Okamoto transformations in the QROMLogarithmic-size (linkable) threshold ring signatures in the plain modelOn the impossibility of algebraic vector commitments in pairing-free groupsCounting vampires: from univariate sumcheck to updatable ZK-SNARKInner product functional commitments with constant-size public parameters and openingsWhat makes Fiat-Shamir zkSNARKs (updatable SRS) simulation extractable?Zero-knowledge for homomorphic key-value commitments with applications to privacy-preserving ledgersBrakedown: linear-time and field-agnostic SNARKs for R1CS\(\mathcal{Lunar}\): a toolbox for more efficient universal and updatable zkSNARKs and commit-and-prove extensionsProofs for inner pairing products and applicationsAn Efficient and Provably Secure Private Polynomial Evaluation SchemeNova: recursive zero-knowledge arguments from folding schemesAdditive-homomorphic functional commitments and applications to homomorphic signaturesLinear-map vector commitments and their practical applicationsPointProofs, revisited\textsf{Bingo}: adaptivity and asynchrony in verifiable secret sharing and distributed key generationRevisiting cycles of pairing-friendly elliptic curves\textsf{Orbweaver}: succinct linear functional commitments from latticesOn the impossibility of algebraic NIZK in pairing-free groupsMoniPoly -- an expressive \(q\)-SDH-based anonymous attribute-based credential systemSuccinct functional commitment for a large class of arithmetic circuitsA position-aware Merkle tree for dynamic cloud data integrity verificationIncrementally aggregatable vector commitments and applications to verifiable decentralized storageDory: efficient, transparent arguments for generalised inner products and polynomial commitmentsVector and functional commitments from latticesExtremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verificationTrusted computing with addition machines. IIVector Commitments and Their ApplicationsRevisiting Cryptographic Accumulators, Additional Properties and Relations to Other PrimitivesZero-Knowledge Authenticated Order Queries and Order Statistics on a ListTransparent SNARKs from DARK compilersMarlin: preprocessing zkSNARKs with universal and updatable SRSBoosting verifiable computation on encrypted dataAggregatable distributed key generationSpartan: efficient and general-purpose zkSNARKs without trusted setup




This page was built for publication: Constant-Size Commitments to Polynomials and Their Applications