Publicly Verifiable Non-Interactive Zero-Knowledge Proofs

From MaRDI portal
Publication:4279587

DOI10.1007/3-540-38424-3_26zbMath0800.68414OpenAlexW1538332662MaRDI QIDQ4279587

Adi Shamir, Dror Lapidot

Publication date: 20 September 1994

Published in: Advances in Cryptology-CRYPT0’ 90 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/3-540-38424-3_26




Related Items (29)

Concurrent knowledge extraction in public-key modelsRound-optimal fully black-box zero-knowledge arguments from one-way permutationsFiat-Shamir for highly sound protocols is instantiableThree-Round Public-Coin Bounded-Auxiliary-Input Zero-Knowledge Arguments of Knowledge3-Message Zero Knowledge Against Human IgnoranceComposable Security in the Tamper-Proof Hardware Model Under Minimal ComplexityOn Zero-Knowledge with Strict Polynomial-Time Simulation and Extraction from Differing-Input Obfuscation for CircuitsIndistinguishable Proofs of Work or KnowledgeStatistical security in two-party computation revisitedImprovements on non-interactive zero-knowledge proof systems related to quadratic residuosity languagesDoubly adaptive zero-knowledge proofsSteganography-free zero-knowledgeThe hunting of the SNARKCrowd verifiable zero-knowledge and end-to-end verifiable multiparty computationRobust Transforming Combiners from Indistinguishability Obfuscation to Functional EncryptionOn the Exact Round Complexity of Self-composable Two-Party ComputationDelayed-input cryptographic protocolsMulti-theorem preprocessing NIZKs from latticesImproved OR-Composition of Sigma-Protocols\(k\)-critical graphs in \(P_5\)-free graphsCompact designated verifier NIZKs from the CDH assumption without pairingsOn the power of secure two-party computationFour-Round Zero-Knowledge Arguments of Knowledge with Strict Polynomial-Time Simulation from Differing-Input Obfuscation for CircuitsFiat–Shamir for Highly Sound Protocols Is InstantiableOn the Power of Secure Two-Party ComputationUniversal Constructions and Robust Combiners for Indistinguishability Obfuscation and Witness EncryptionOn the Existence of Extractable One-Way FunctionsConcurrent Non-Malleable Commitments (and More) in 3 RoundsNew techniques for zero-knowledge: leveraging inefficient provers to reduce assumptions, interaction, and trust






This page was built for publication: Publicly Verifiable Non-Interactive Zero-Knowledge Proofs