Succinct Non-interactive Arguments via Linear Interactive Proofs

From MaRDI portal
Publication:4910285

DOI10.1007/978-3-642-36594-2_18zbMath1316.68056OpenAlexW1890128745MaRDI QIDQ4910285

Rafail Ostrovsky, Omer Paneth, Alessandro Chiesa, Yuval Ishai, Nir Bitansky

Publication date: 18 March 2013

Published in: Theory of Cryptography (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-36594-2_18




Related Items (62)

\textsf{Halo Infinite}: proof-carrying data from additive polynomial commitmentsSubquadratic SNARGs in the random oracle modelUpdateable Inner Product Argument with Logarithmic Verifier and ApplicationsFine-grained secure computationOn the (In)Security of SNARKs in the Presence of OraclesBooLigero: improved sublinear zero knowledge proofs for Boolean circuitsInteractive Oracle ProofsDelegating RAM ComputationsPractical witness-key-agreement for blockchain-based dark pools financial tradingAsymptotically quasi-optimal cryptographySecure multiparty computation with sublinear preprocessingZero-knowledge IOPs with linear-time prover and polylogarithmic-time verifierOn succinct non-interactive arguments in relativized worldsSNARGs for P from sub-exponential DDH and QRA Unified Framework for Non-universal SNARKsECLIPSE: Enhanced Compiling Method for Pedersen-Committed zkSNARK EnginesSuccinct arguments in the quantum random oracle modelOn the (In)security of Kilian-based SNARGsSnarkPack: practical SNARK aggregationAn efficient identity tracing scheme for blockchain-based systemsHyperPlonk: Plonk with linear-time prover and high-degree custom gatesLigero: lightweight sublinear arguments without a trusted setupNon-interactive publicly-verifiable delegation of committed programsScalable zero knowledge via cycles of elliptic curvesRinocchio: SNARKs for ring arithmeticBatch arguments for \textsf{NP} and more from standard bilinear group assumptionsNIZK from SNARGsCounting vampires: from univariate sumcheck to updatable ZK-SNARKMyOPE: malicious security for oblivious polynomial evaluationWhat makes Fiat-Shamir zkSNARKs (updatable SRS) simulation extractable?Succinct arguments for RAM programs via projection codesLattice-based succinct arguments for NP with polylogarithmic-time verificationMultikey Fully Homomorphic Encryption and ApplicationsTwo-round MPC without round collapsing revisited -- towards efficient malicious protocols\(\mathcal{Lunar}\): a toolbox for more efficient universal and updatable zkSNARKs and commit-and-prove extensionsSuccinct publicly-certifiable proofs. Or, can a blockchain verify a designated-verifier proof?Lower bound on SNARGs in the random oracle modelZero-knowledge succinct non-interactive arguments of knowledge based on sets of polynomialsFully succinct batch arguments for \textsf{NP} from indistinguishability obfuscationThe hunting of the SNARKNon-interactive zero-knowledge from non-interactive batch arguments\textsf{Orbweaver}: succinct linear functional commitments from latticesCorrelation intractability and SNARGs from sub-exponential DDHShorter arithmetization of nondeterministic computationsA more efficient leveled strongly-unforgeable fully homomorphic signature schemeSublinear Zero-Knowledge Arguments for RAM ProgramsOn the Black-box Use of Somewhat Homomorphic Encryption in NonInteractive Two-Party ProtocolsNo-signaling linear PCPsHow to build time-lock encryptionNo-signaling linear PCPsRational SumchecksTransparent SNARKs from DARK compilersMarlin: preprocessing zkSNARKs with universal and updatable SRS\textsc{Fractal}: post-quantum and transparent recursive proofs from holographyOn the Existence of Extractable One-Way FunctionsConstant-Round Interactive Proofs for Delegating ComputationOn succinct arguments and witness encryption from groupsSpartan: efficient and general-purpose zkSNARKs without trusted setupLattice-Based SNARGs and Their Application to More Efficient ObfuscationComputational Integrity with a Public Random String from Quasi-Linear PCPsTurboIKOS: improved non-interactive zero knowledge and post-quantum signaturesSuccinct non-interactive secure computation




This page was built for publication: Succinct Non-interactive Arguments via Linear Interactive Proofs