NIZKs with an Untrusted CRS: Security in the Face of Parameter Subversion (Q2953796): Difference between revisions

From MaRDI portal
Created claim: Wikidata QID (P12): Q57433759, #quickstatements; #temporary_batch_1707161894653
ReferenceBot (talk | contribs)
Changed an Item
 
(3 intermediate revisions by 3 users not shown)
Property / describes a project that uses
 
Property / describes a project that uses: zk-SNARK / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/978-3-662-53890-6_26 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W3203084829 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Structure-Preserving Signatures and Commitments to Group Elements / rank
 
Normal rank
Property / cites work
 
Property / cites work: Structure-Preserving Signatures from Type II Pairings / rank
 
Normal rank
Property / cites work
 
Property / cites work: Lower bounds for non-black-box zero knowledge / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: NIZKs with an Untrusted CRS: Security in the Face of Parameter Subversion / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3210163 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology – CRYPTO 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Security of Symmetric Encryption against Mass Surveillance / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Scalable Zero Knowledge via Cycles of Elliptic Curves / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the existence of extractable one-way functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Noninteractive Zero-Knowledge / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology – CRYPTO 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4783728 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Indifferentiable Hashing into Ordinary Elliptic Curves / rank
 
Normal rank
Property / cites work
 
Property / cites work: Resettable zero-knowledge (extended abstract) / rank
 
Normal rank
Property / cites work
 
Property / cites work: On Signatures of Knowledge / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4035738 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4783745 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Formal Treatment of Backdoored Pseudorandom Generators / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Public-Key Cryptography in the Presence of Key Leakage / rank
 
Normal rank
Property / cites work
 
Property / cites work: Nonmalleable Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Zaps and Their Applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fine-Tuning Groth-Sahai Proofs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Bringing People of Different Beliefs Together to Do UC / rank
 
Normal rank
Property / cites work
 
Property / cites work: A uniform-complexity treatment of encryption and zero-knowledge / rank
 
Normal rank
Property / cites work
 
Property / cites work: Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Definitions and properties of zero-knowledge proof systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Knowledge Complexity of Interactive Proof Systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures / rank
 
Normal rank
Property / cites work
 
Property / cites work: Short Pairing-Based Non-interactive Zero-Knowledge Arguments / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Fully Structure-Preserving Signatures for Large Messages / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptography in the Multi-string Model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Non-interactive Zaps and New Techniques for NIZK / rank
 
Normal rank
Property / cites work
 
Property / cites work: Perfect Non-interactive Zero Knowledge for NP / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Non-interactive Proof Systems for Bilinear Groups / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4249347 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Distributing the setup in universally composable multi-party computation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - CRYPTO 2003 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4373649 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4941813 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A family of trapdoor ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cliptography: Clipping the Power of Kleptographic Attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Algorithmic Number Theory / rank
 
Normal rank
Property / cites work
 
Property / cites work: Lower Bounds for Non-interactive Zero-Knowledge / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Dark Side of “Black-Box” Cryptography or: Should We Trust Capstone? / rank
 
Normal rank

Latest revision as of 06:03, 13 July 2024

scientific article
Language Label Description Also known as
English
NIZKs with an Untrusted CRS: Security in the Face of Parameter Subversion
scientific article

    Statements

    NIZKs with an Untrusted CRS: Security in the Face of Parameter Subversion (English)
    0 references
    0 references
    0 references
    0 references
    6 January 2017
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers