Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Communication-Efficient Non-interactive Proofs of Knowledge with Online Extractors - MaRDI portal

Communication-Efficient Non-interactive Proofs of Knowledge with Online Extractors

From MaRDI portal
Publication:5451024

DOI10.1007/11535218_10zbMath1145.94467OpenAlexW1505345253MaRDI QIDQ5451024

Marc Fischlin

Publication date: 17 March 2008

Published in: Advances in Cryptology – CRYPTO 2005 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/11535218_10




Related Items (44)

EPID with malicious revocationNon-interactive half-aggregation of EdDSA and variants of Schnorr signaturesGroup Signatures with Decentralized TracingA new simple technique to bootstrap various lattice zero-knowledge proofs to QROM secure NIZKsAn efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniableComposition with knowledge assumptionsFiat-Shamir for highly sound protocols is instantiableInteractive Oracle ProofsNaor-Yung paradigm with shared randomness and applicationsGuaranteed output in \(O(\sqrt{n})\) rounds for round-robin sampling protocolsGroup signatures and more from isogenies and lattices: generic, simple, and efficientFiat-Shamir bulletproofs are non-malleable (in the algebraic group model)Witness-succinct universally-composable SNARKsPrivacy-preserving blueprintsRevisiting BBS signaturesEfficient NIZKs and signatures from commit-and-open protocols in the QROMEfficient ECDSA-based adaptor signature for batched atomic swapsImproved straight-line extraction in the random oracle model with applications to signature aggregationWhat makes Fiat-Shamir zkSNARKs (updatable SRS) simulation extractable?Generalized channels from limited blockchain scripts and adaptor signaturesEfficient NIZK arguments with straight-line simulation and extractionUniversally composable \(\varSigma \)-protocols in the global random-oracle modelEndemic oblivious transfer via random oracles, revisitedSecure multiparty computation from threshold encryption based on class groupsFully adaptive Schnorr threshold signaturesNon-interactive composition of sigma-protocols via Share-then-HashPractical dynamic group signatures without knowledge extractorsCryptographic reverse firewalls for interactive proof systemsNovel \(\Omega\)-protocols for NPSublinear Zero-Knowledge Arguments for RAM ProgramsGroup signatures and more from isogenies and lattices: generic, simple, and efficientUnclonable Group IdentificationA Discrete-Logarithm Based Non-interactive Non-malleable Commitment Scheme with an Online Knowledge ExtractorUnlinkable Randomizable Signature and Its Application in Group SignatureAn efficient and secure two-flow zero-knowledge identification protocolFast secure two-party ECDSA signingFully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval modelExtended security arguments for signature schemesThreshold ring signatures: new definitions and post-quantum securityTwo-party adaptor signatures from identification schemesAn efficient and generic construction for Signal's handshake (X3DH): post-quantum, state leakage secure, and deniableNaor-Yung Paradigm with Shared Randomness and ApplicationsFiat–Shamir for Highly Sound Protocols Is InstantiableEfficient fully structure-preserving signatures and shrinking commitments




This page was built for publication: Communication-Efficient Non-interactive Proofs of Knowledge with Online Extractors