Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Non-interactive Zaps and New Techniques for NIZK - MaRDI portal

Non-interactive Zaps and New Techniques for NIZK

From MaRDI portal
Publication:5756624

DOI10.1007/11818175_6zbMath1129.94024OpenAlexW1522706628MaRDI QIDQ5756624

Amit Sahai, Jens Groth, Rafail Ostrovsky

Publication date: 4 September 2007

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/11818175_6




Related Items (45)

Verifiable Inner Product Encryption SchemeNon-malleable codes for bounded parallel-time tamperingQA-NIZK Arguments of Same Opening for Bilateral CommitmentsUnconditionally anonymous ring and mesh signaturesDual-mode NIZKs: possibility and impossibility results for property transferDistributed (correlation) samplers: how to remove a trusted dealer in one roundFully homomorphic NIZK and NIWI proofsVerifiably-Extractable OWFs and Their Applications to Subversion Zero-KnowledgeExplainable argumentsA survey of elliptic curves for proof systemsVerifiable Functional EncryptionNIZKs with an Untrusted CRS: Security in the Face of Parameter SubversionChopsticks: fork-free two-round multi-signatures from non-interactive assumptionsObtaining simulation extractable NIZKs in the updatable CRS model genericallyGentry-Wichs is tight: a falsifiable non-adaptively sound SNARGEfficient NIZKs for algebraic setsUpdatable NIZKs from non-interactive zapsMore efficient verifiable functional encryptionGroup homomorphic encryption: characterizations, impossibility results, and applicationsOn constant-round concurrent non-malleable proof systemsSecurity-preserving distributed samplers: how to generate any CRS in one round without random oraclesOn the impossibility of algebraic NIZK in pairing-free groupsA note on non-interactive zero-knowledge from CDHEfficient traceable signatures in the standard modelIndividual simulationsTwo-Round and Non-Interactive Concurrent Non-Malleable Commitments from Time-Lock PuzzlesStatistical ZAPs from group-based assumptionsTwo-round maliciously secure computation with super-polynomial simulationUnnamed ItemTightly secure ring signatures in the standard modelCompact Group Signatures Without Random OraclesFully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval modelOn subversion-resistant SNARKsHow to extract useful randomness from unreliable sourcesStatistical ZAPR arguments from bilinear mapsStatistical ZAP argumentsStatistical Zaps and new oblivious transfer protocolsNon-interactive zero knowledge from sub-exponential DDHTowards accountability in CRS generationCo-sound Zero-Knowledge with Public KeysProofs on Encrypted Values in Bilinear Groups and an Application to Anonymity of SignaturesEfficient Traceable Signatures in the Standard Model(Commit-and-prove) predictable arguments with privacyNew techniques for zero-knowledge: leveraging inefficient provers to reduce assumptions, interaction, and trustShorter non-interactive zero-knowledge arguments and ZAPs for algebraic languages




This page was built for publication: Non-interactive Zaps and New Techniques for NIZK