NIZKs with maliciously chosen CRS: subversion advice-ZK and accountable soundness
From MaRDI portal
Publication:6660376
DOI10.1007/978-3-031-71070-4_1MaRDI QIDQ6660376
Brent Waters, Prabhanjan V. Ananth, Pratik Soni, Hadar Kaner, Gilad Asharov, Vipul Goyal
Publication date: 10 January 2025
Cryptography (94A60) Theory of compilers and interpreters (68N20) Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62)
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Definitions and properties of zero-knowledge proof systems
- Towards non-interactive witness hiding
- Towards accountability in CRS generation
- Time- and space-efficient arguments from groups of unknown order
- Noninteractive zero knowledge for NP from (Plain) Learning With Errors
- Watermarking public-key cryptographic primitives
- NIZKs with an Untrusted CRS: Security in the Face of Parameter Subversion
- Bringing People of Different Beliefs Together to Do UC
- Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys
- Cryptography in the Multi-string Model
- Reducing Trust in the PKG in Identity Based Cryptosystems
- Noninteractive Zero-Knowledge
- Fiat-Shamir: from practice to theory
- Collusion resistant traitor tracing from learning with errors
- Zaps and Their Applications
- Non-interactive Zaps and New Techniques for NIZK
- Theory of Cryptography
- Beyond software watermarking: traitor-tracing for pseudorandom functions
This page was built for publication: NIZKs with maliciously chosen CRS: subversion advice-ZK and accountable soundness
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6660376)