Efficient Non-interactive Proof Systems for Bilinear Groups

From MaRDI portal
Revision as of 10:52, 9 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:5458605

DOI10.1007/978-3-540-78967-3_24zbMath1149.94320OpenAlexW2141395382MaRDI QIDQ5458605

Jens Groth, Amit Sahai

Publication date: 15 April 2008

Published in: Advances in Cryptology – EUROCRYPT 2008 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-540-78967-3_24




Related Items (only showing first 100 items - show all)

Verifiable Inner Product Encryption SchemeHierarchical Identity-Based Encryption with Tight Multi-challenge SecurityBringing Order to Chaos: The Case of Collision-Resistant Chameleon-HashesQA-NIZK Arguments of Same Opening for Bilateral CommitmentsSignatures of Knowledge for Boolean Circuits Under Standard AssumptionsImplicit Zero-Knowledge Arguments and Applications to the Malicious SettingEfficient Zero-Knowledge Proofs of Non-algebraic Statements with Sublinear Amortized CostPractical Round-Optimal Blind Signatures in the Standard ModelStructure-Preserving Signatures from Standard Assumptions, RevisitedShort Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple AssumptionsPublic-Key Encryption with Simulation-Based Selective-Opening Security and Compact CiphertextsDynamic Threshold Public-Key Encryption with Decryption Consistency from Static AssumptionsGeneric Transformation to Strongly Existentially Unforgeable Signature Schemes with Continuous Leakage ResiliencyConstant Size Ring Signature Without Random OracleA New Public Remote Integrity Checking Scheme with User PrivacyEfficient Non-interactive Range ProofRational Modular Encoding in the DCR Setting: Non-interactive Range Proofs and Paillier-Based Naor-Yung in the Standard ModelCompressed $$\varSigma $$-Protocols for Bilinear Group Arithmetic Circuits and Application to Logarithmic Transparent Threshold SignaturesA survey of elliptic curves for proof systemsExtendable threshold ring signatures with enhanced anonymityStructure-Preserving Smooth Projective HashingSignature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice AssumptionsNIZKs with an Untrusted CRS: Security in the Face of Parameter SubversionPAPR: publicly auditable privacy revocation for anonymous credentialsEnd-to-end secure messaging with traceability only for illegal contentChopsticks: fork-free two-round multi-signatures from non-interactive assumptionsNon-interactive blind signatures for random messagesDeniable authentication when signing keys leakA generic transform from multi-round interactive proof to NIZKBatch arguments for \textsf{NP} and more from standard bilinear group assumptionsMultimodal private signaturesRelaxed Lattice-Based Signatures with Short Zero-Knowledge ProofsStrongly Unforgeable Signature Resilient to Polynomially Hard-to-Invert Leakage Under Standard AssumptionsA Revocable Group Signature Scheme with Scalability from Simple Assumptions and Its ImplementationFuzzy authenticated key exchange with tight securityWitness encryption from smooth projective hashing systemTraceable constant-size multi-authority credentialsEfficient Public-Key Cryptography with Bounded Leakage and Tamper ResilienceTraceable constant-size multi-authority credentialsDAG-\( \Sigma \): a DAG-based sigma protocol for relations in CNFUnconditionally secure NIZK in the fine-grained settingTrapdoor sanitizable and redactable signatures with unlinkability, invisibility and strong context-hidingAttribute-based signatures for range of inner product and its applicationsNIWI and new notions of extraction for algebraic languagesSNACKs: leveraging proofs of sequential work for blockchain light clientsGeneric constructions of master-key KDM secure attribute-based encryptionProofs for inner pairing products and applicationsEfficient NIZKs for algebraic setsHierarchical Attribute-Based SignaturesCRS-updatable asymmetric quasi-adaptive NIZK argumentsPractical non-malleable codes from symmetric-key primitives in 2-split-state modelEndemic oblivious transfer via random oracles, revisitedOn the impossibility of algebraic NIZK in pairing-free groupsIdentity-based encryption with (almost) tight security in the multi-instance, multi-ciphertext settingIndistinguishability obfuscationConstructions Secure Against Receiver Selective Opening and Chosen Ciphertext AttacksAnonymous Proxy SignaturesFully Anonymous Group Signatures Without Random OraclesA Signature Scheme with Efficient Proof of ValidityEfficient and Secure Generalized Pattern Matching via Fast Fourier TransformAchieving Optimal Anonymity in Transferable E-Cash with a JudgeRevocable Attribute-Based Signatures with Adaptive Security in the Standard ModelEfficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRSEfficient UC-Secure Authenticated Key-Exchange for Algebraic LanguagesTagged One-Time Signatures: Tight Security and Optimal Tag SizeEfficient Completely Context-Hiding Quotable and Linearly Homomorphic SignaturesVerifiable Elections That Scale for FreeAccess Control Encryption for Equality, Comparison, and MoreImproved Structure Preserving Signatures Under Standard Bilinear AssumptionsCut Down the Tree to Achieve Constant Complexity in Divisible E-cashStructure-Preserving Chosen-Ciphertext Security with Shorter Verifiable CiphertextsProjective Arithmetic Functional Encryption and Indistinguishability Obfuscation from Degree-5 Multilinear MapsEfficient Confirmer Signatures from the “Signature of a Commitment” ParadigmZero-knowledge proofs for set membership: efficient, succinct, modularFine-grained secure attribute-based encryptionAlmost Optimal Oblivious Transfer from QA-NIZKAmbiguous Optimistic Fair ExchangeUniversally Composable Adaptive Oblivious TransferUpdatable Trapdoor SPHFs: Modular Construction of Updatable Zero-Knowledge Arguments and MoreAn Anonymous Credential System with Constant-Size Attribute Proofs for CNF Formulas with NegationsContinuously non-malleable codes with split-state refreshAn Analysis of Affine Coordinates for Pairing ComputationMulti-theorem preprocessing NIZKs from latticesSimulation-based receiver selective opening CCA secure PKE from standard computational assumptionsNon-interactive Confirmer SignaturesAttribute-Based SignaturesSub-linear Size Traceable Ring Signatures without Random OraclesA Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext AttacksAnonymous Consecutive Delegation of Signing Rights: Unifying Group and Proxy SignaturesCompact E-Cash and Simulatable VRFs RevisitedProofs on Encrypted Values in Bilinear Groups and an Application to Anonymity of SignaturesIdentity Based Group Signatures from Hierarchical Identity-Based EncryptionEfficient Traceable Signatures in the Standard ModelUniversally Composable Adaptive Priced Oblivious TransferBlock-Wise P-Signatures and Non-interactive Anonymous Credentials with Efficient AttributesSanitizable Signatures RevisitedOptimally Sound Sigma Protocols Under DCRAAdequate Elliptic Curves for Computing the Product of n PairingsShort Attribute-Based Signatures for Threshold PredicatesPlaintext-Checkable Encryption







This page was built for publication: Efficient Non-interactive Proof Systems for Bilinear Groups