Zaps and Their Applications

From MaRDI portal
Revision as of 03:01, 9 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:5432360

DOI10.1137/S0097539703426817zbMath1125.94019OpenAlexW2132951912MaRDI QIDQ5432360

Cynthia Dwork, Moni Naor

Publication date: 3 January 2008

Published in: SIAM Journal on Computing (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1137/s0097539703426817






Related Items (72)

Compact ring signatures from learning with errorsOne-message zero knowledge and non-malleable commitmentsCertifying trapdoor permutations, revisitedOn Non-Black-Box Simulation and the Impossibility of Approximate ObfuscationThe Journey from NP to TFNP HardnessThree-Round Public-Coin Bounded-Auxiliary-Input Zero-Knowledge Arguments of KnowledgeA note on the Dwork-Naor timed deniable authenticationSeparating Computational and Statistical Differential Privacy in the Client-Server ModelA note on perfect correctness by derandomizationUnconditionally anonymous ring and mesh signaturesVersatile and sustainable timed-release encryption and sequential time-lock puzzles (extended abstract)Minimal Assumptions and Round Complexity for Concurrent Zero-Knowledge in the Bare Public-Key ModelRound-optimal multi-party computation with identifiable abortNon-interactive zero-knowledge proofs with fine-grained securityToward non-interactive zero-knowledge proofs for NP from LWEProofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systemsFully homomorphic NIZK and NIWI proofsExplainable argumentsMultiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscationTransparent batchable time-lock puzzles and applications to Byzantine consensusNIZKs with an Untrusted CRS: Security in the Face of Parameter SubversionCollision-resistance from multi-collision-resistanceNIZK from SNARGsVerifiable relation sharing and multi-verifier zero-knowledge in two rounds: trading NIZKs with honest majority (extended abstract)Logarithmic-size (linkable) threshold ring signatures in the plain modelRound-optimal honest-majority MPC in Minicrypt and with everlasting security (extended abstract)Statistical security in two-party computation revisitedUnconditionally secure NIZK in the fine-grained settingNIWI and new notions of extraction for algebraic languagesStatistically sender-private OT from LPN and derandomizationUpdatable NIZKs from non-interactive zapsUniversal reductions: reductions relative to stateful oraclesMore efficient verifiable functional encryptionTowards practical homomorphic time-lock puzzles: applicability and verifiabilityOn constant-round concurrent non-malleable proof systemsThe hunting of the SNARKReusable secure computation in the plain modelA note on non-interactive zero-knowledge from CDHSecure MPC: laziness leads to GODBlack-box impossibilities of obtaining 2-round weak ZK and strong WI from polynomial hardnessStatistical ZAPs from group-based assumptions(2+\(f\)(\(n\)))-SAT and its properties.Structure Versus Hardness Through the Obfuscation LensPredictable Arguments of KnowledgeOn the Exact Round Complexity of Self-composable Two-Party ComputationLower bounds for non-black-box zero knowledgeLimits of Constructive Security ProofsInjective trapdoor functions via derandomization: how strong is Rudich's black-box barrier?Collision Resistance from Multi-collision ResistanceInjective trapdoor functions via derandomization: how strong is Rudich's black-box barrier?Verifiable random functions from non-interactive witness-indistinguishable proofsRound-optimal secure multi-party computationA Transform for NIZK Almost as Efficient and General as the Fiat-Shamir Transform Without Programmable Random OraclesImproved OR-Composition of Sigma-ProtocolsWeak zero-knowledge via the Goldreich-Levin theoremConcurrently secure blind Schnorr signaturesNIZKs with maliciously chosen CRS: subversion advice-ZK and accountable soundnessResettably Secure ComputationCompact designated verifier NIZKs from the CDH assumption without pairingsHow to extract useful randomness from unreliable sourcesNon-interactive zero-knowledge in pairing-free groups from weaker assumptionsStatistical ZAPR arguments from bilinear mapsStatistical ZAP argumentsStatistical Zaps and new oblivious transfer protocolsNon-interactive zero knowledge from sub-exponential DDHRound-optimal blind signatures in the plain model from classical and quantum standard assumptionsTowards accountability in CRS generationOn the Existence of Extractable One-Way FunctionsNew techniques for zero-knowledge: leveraging inefficient provers to reduce assumptions, interaction, and trustShorter non-interactive zero-knowledge arguments and ZAPs for algebraic languagesA Note on Perfect Correctness by DerandomizationWeak Zero-Knowledge beyond the Black-Box Barrier







This page was built for publication: Zaps and Their Applications