Universal Arguments and their Applications

From MaRDI portal
Publication:3642859

DOI10.1137/070709244zbMath1180.94047OpenAlexW2002919335MaRDI QIDQ3642859

Boaz Barak, Oded Goldreich

Publication date: 6 November 2009

Published in: SIAM Journal on Computing (Search for Journal in Brave)

Full work available at URL: https://semanticscholar.org/paper/57afe1ed12fbeed2009ae02cd28962eb81f37d2a




Related Items (43)

Concurrent knowledge extraction in public-key modelsConstant-round leakage-resilient zero-knowledge from collision resistanceSuccinct non-interactive arguments via linear interactive proofsOn Non-Black-Box Simulation and the Impossibility of Approximate ObfuscationThree-Round Public-Coin Bounded-Auxiliary-Input Zero-Knowledge Arguments of KnowledgeShort PCPPs verifiable in polylogarithmic time with \(O(1)\) queries3-Message Zero Knowledge Against Human IgnoranceOn the (In)Security of SNARKs in the Presence of OraclesProofs of SpaceConstant-Round Concurrent Zero-Knowledge from Indistinguishability ObfuscationInteractive Oracle ProofsFully leakage-resilient signaturesNon-malleable commitments against quantum attacksOn the (In)security of Kilian-based SNARGsRefereed delegation of computationOn Zero-Knowledge with Strict Polynomial-Time Simulation and Extraction from Differing-Input Obfuscation for CircuitsBreaking the \(O(\sqrt{n})\)-bit barrier: Byzantine agreement with polylog bits per partyThe gap is sensitive to size of preimages: collapsing property doesn't go beyond quantum collision-resistance for preimages bounded hash functionsNon-black-box simulation in the fully concurrent setting, revisitedParallelizable delegation from LWESuccinct NP Proofs from an Extractability AssumptionNon-interactive universal argumentsSuccinct arguments for RAM programs via projection codesParallel repetition of computationally sound protocols revisitedA new approach to efficient non-malleable zero-knowledgeUniversal reductions: reductions relative to stateful oraclesThe hunting of the SNARKPCPs and the hardness of generating synthetic dataCombinatorial PCPs with efficient verifiersOn the Connection between Leakage Tolerance and Adaptive SecurityOn expected probabilistic polynomial-time adversaries: a suggestion for restricted definitions and their benefitsDistinguishing Distributions Using Chernoff InformationLimitation on the Rate of Families of Locally Testable CodesNo-signaling linear PCPsNo-signaling linear PCPsThe Complexity of Zero KnowledgePossibility and Impossibility Results for Encryption and Commitment Secure under Selective OpeningFour-Round Zero-Knowledge Arguments of Knowledge with Strict Polynomial-Time Simulation from Differing-Input Obfuscation for CircuitsSPARKs: succinct parallelizable arguments of knowledgeHandling expected polynomial-time strategies in simulation-based security proofsConstrained PRFs for Unbounded Inputs with Short KeysOn the Existence of Extractable One-Way FunctionsSpooky Interaction and Its Discontents: Compilers for Succinct Two-Message Argument Systems




This page was built for publication: Universal Arguments and their Applications