Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures - MaRDI portal

Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures

From MaRDI portal
Publication:5459095

DOI10.1007/11935230_29zbMath1172.94615OpenAlexW1548963432MaRDI QIDQ5459095

Jens Groth

Publication date: 24 April 2008

Published in: Advances in Cryptology – ASIACRYPT 2006 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/11935230_29




Related Items (91)

Verifiable Inner Product Encryption SchemeBringing Order to Chaos: The Case of Collision-Resistant Chameleon-HashesOn Black-Box Extensions of Non-interactive Zero-Knowledge Arguments, and Signatures Directly from Simulation SoundnessStructure-preserving signatures and commitments to group elementsQA-NIZK Arguments of Same Opening for Bilateral CommitmentsSignatures of Knowledge for Boolean Circuits Under Standard AssumptionsTightly secure signatures and public-key encryptionGeneric Framework for Attribute-Based Group SignatureSignatures of knowledge for Boolean circuits under standard assumptionsStructure-Preserving Signatures from Standard Assumptions, RevisitedShort Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple AssumptionsAnother look at extraction and randomization of Groth's zk-SNARKConstant-size structure-preserving signatures: generic constructions and simple assumptionsIssuer-hiding attribute-based credentialsSelectively linkable group signatures -- stronger security and preserved verifiabilitySubversion-resistant quasi-adaptive NIZK and applications to modular zk-SNARKsSkipping the \(q\) in group signaturesDual-mode NIZKs: possibility and impossibility results for property transferOn black-box extension of a non-interactive zero-knowledge proof system for secret equalitySubversion-resilient enhanced privacy IDShort, invertible elements in partially splitting cyclotomic rings and applications to lattice-based zero-knowledge proofsMore efficient structure-preserving signatures -- or: bypassing the type-III lower boundsEfficient Non-interactive Range ProofFiat-Shamir bulletproofs are non-malleable (in the algebraic group model)Continuously non-malleable secret sharing for general access structuresHardware security without secure hardware: how to decrypt with a password and a serverEfficient Distributed Tag-Based Encryption and Its Application to Group Signatures with Efficient Distributed TraceabilityLinearly homomorphic structure-preserving signatures and their applicationsKey-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledgeWitness-succinct universally-composable SNARKsSpartan and bulletproofs are simulation-extractable (for free!)A survey of elliptic curves for proof systemsQANIZK for adversary-dependent languages and their applicationsExtendable threshold ring signatures with enhanced anonymityNIZKs with an Untrusted CRS: Security in the Face of Parameter SubversionUnique-path identity based encryption with applications to strongly secure messagingDeniable authentication when signing keys leakAnonymous yet Traceable Strong Designated Verifier SignatureLogarithmic-size (linkable) threshold ring signatures in the plain modelObtaining simulation extractable NIZKs in the updatable CRS model genericallyDAG-\( \Sigma \): a DAG-based sigma protocol for relations in CNFGeneric constructions of master-key KDM secure attribute-based encryptionUsing fully homomorphic hybrid encryption to minimize non-interative zero-knowledge proofsCompact Ring Signature in the Standard Model for BlockchainUpdatable NIZKs from non-interactive zapsAuditable asymmetric password authenticated public key establishmentCRS-updatable asymmetric quasi-adaptive NIZK argumentsShorter quasi-adaptive NIZK proofs for linear subspacesNetwork-agnostic security comes (almost) for free in DKG and MPCOn the impossibility of algebraic NIZK in pairing-free groupsEfficient traceable signatures in the standard modelTraceable policy-based signatures and instantiation from latticesNon-interactive composition of sigma-protocols via Share-then-HashConstructions Secure Against Receiver Selective Opening and Chosen Ciphertext AttacksAdaptively secure non-interactive CCA-secure threshold cryptosystems: generic framework and constructionsFoundations of fully dynamic group signaturesContinuously non-malleable codes in the split-state modelOn the tightness of forward-secure signature reductionsFully Anonymous Group Signatures Without Random OraclesGroup EncryptionBreaking and Fixing Anonymous Credentials for the CloudBounded tamper resilience: how to go beyond the algebraic barrierSecret, verifiable auctions from electionsEfficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRSTagged One-Time Signatures: Tight Security and Optimal Tag SizeVerifiable Elections That Scale for FreeCompact structure-preserving signatures with almost tight securityImproved Structure Preserving Signatures Under Standard Bilinear AssumptionsScalable Multi-party Private Set-IntersectionStructure-Preserving Chosen-Ciphertext Security with Shorter Verifiable CiphertextsFunctional Encryption: Deterministic to Randomized Functions from Simple AssumptionsBloom filter encryption and applications to efficient forward-secret 0-RTT key exchangeReconfigurable Cryptography: A Flexible Approach to Long-Term SecurityMulti-theorem preprocessing NIZKs from latticesFully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval modelOn subversion-resistant SNARKsNon-interactive Confirmer SignaturesAttribute-Based SignaturesAn Efficient Post-Quantum One-Time Signature SchemeCryptography in the multi-string modelA Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext AttacksOne-Time Signatures and Chameleon Hash FunctionsIdentity-Based Group EncryptionFoundations of Fully Dynamic Group SignaturesProofs on Encrypted Values in Bilinear Groups and an Application to Anonymity of SignaturesEfficient Traceable Signatures in the Standard ModelShort tightly secure signatures for signing a vector of group elements: a new approachOptimally Sound Sigma Protocols Under DCRAReverse firewalls for actively secure MPCsShorter non-interactive zero-knowledge arguments and ZAPs for algebraic languages0-RTT Key Exchange with Full Forward Secrecy




This page was built for publication: Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures