Fine-grained verifier NIZK and its applications
From MaRDI portal
Publication:6088993
DOI10.1007/978-3-031-31371-4_17zbMath1526.94038MaRDI QIDQ6088993
Xiang-Yu Liu, Shuai Han, Da-Wu Gu, Shengli Liu
Publication date: 16 November 2023
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Cites Work
- Unnamed Item
- Unnamed Item
- Tightly secure signatures and public-key encryption
- Improved (almost) tightly-secure simulation-sound QA-NIZK with applications
- Kurosawa-Desmedt meets tight security
- Identity-based encryption tightly secure under chosen-ciphertext attacks
- Tightly CCA-secure inner product functional encryption scheme
- Authenticated key exchange and signatures with tight security in the standard model
- Shorter QA-NIZK and SPS with tighter security
- Tight leakage-resilient CCA-security from quasi-adaptive hash proof system
- Compactly Hiding Linear Spans
- Tightly CCA-Secure Encryption Without Pairings
- Fully Secure Functional Encryption for Inner Products, from Standard Assumptions
- An Algebraic Framework for Diffie-Hellman Assumptions
- Fully, (Almost) Tightly Secure IBE and Dual System Groups
- Shorter Quasi-Adaptive NIZK Proofs for Linear Subspaces
- (Hierarchical) Identity-Based Encryption from Affine Message Authentication
- Concise Multi-challenge CCA-Secure Encryption and Signatures with Almost Tight Security
- Tightly-Secure Signatures from Chameleon Hash Functions
- Simple Functional Encryption Schemes for Inner Products
- Functional Encryption: Definitions and Challenges
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- Tagged One-Time Signatures: Tight Security and Optimal Tag Size
- Stretching Groth-Sahai: NIZK Proofs of Partial Satisfiability
- New Techniques for Noninteractive Zero-Knowledge
- Tightly secure inner product functional encryption: multi-input and function-hiding constructions
This page was built for publication: Fine-grained verifier NIZK and its applications