Helger Lipmaa

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Polymath: Groth16 is not the limit2025-01-10Paper
Constant-size zk-SNARKs in ROM from falsifiable assumptions2024-11-13Paper
Lookup arguments: improvements, extensions and applications to zero-knowledge decision trees2024-11-12Paper
Set (non-)membership NIZKs from determinantal accumulators2024-10-16Paper
Algebraic group model with oblivious sampling2024-08-15Paper
On black-box knowledge-sound commit-and-prove SNARKs2024-06-26Paper
Counting vampires: from univariate sumcheck to updatable ZK-SNARK
Advances in Cryptology – ASIACRYPT 2022
2023-08-16Paper
Verifiably-Extractable OWFs and Their Applications to Subversion Zero-Knowledge
Lecture Notes in Computer Science
2023-05-26Paper
Smooth zero-knowledge hash functions
Lecture Notes in Computer Science
2023-05-12Paper
Gentry-Wichs is tight: a falsifiable non-adaptively sound SNARG
Lecture Notes in Computer Science
2023-05-12Paper
Efficient NIZKs for algebraic sets
Lecture Notes in Computer Science
2023-05-12Paper
Succinct functional commitment for a large class of arithmetic circuits2023-03-29Paper
Key-and-argument-updatable QA-NIZKs2022-12-16Paper
On QA-NIZK in the BPK model
Lecture Notes in Computer Science
2022-10-13Paper
A unified framework for non-universal SNARKs
Public-Key Cryptography – PKC 2022
2022-07-08Paper
Somewhere statistically binding commitment schemes with applications2022-06-17Paper
More efficient shuffle argument from unique factorization2021-12-20Paper
On subversion-resistant SNARKs
Journal of Cryptology
2021-07-02Paper
Optimally sound sigma protocols under DCRA
Financial Cryptography and Data Security
2021-03-17Paper
A simpler rate-optimal CPIR protocol
Financial Cryptography and Data Security
2021-03-17Paper
UC-secure CRS generation for SNARKs2020-05-06Paper
DL-extractable UC-commitment schemes2020-01-30Paper
Prover-efficient commit-and-prove zero-knowledge snarks
International Journal of Applied Cryptography
2018-11-26Paper
On the security properties of e-voting bulletin boards2018-10-17Paper
An efficient pairing-based shuffle argument2018-03-08Paper
A subversion-resistant SNARK2018-02-23Paper
CCA-secure inner-product functional encryption from projective hash functions
Lecture Notes in Computer Science
2017-06-13Paper
A shuffle argument secure in the generic model
Advances in Cryptology – ASIACRYPT 2016
2017-01-06Paper
Prover-efficient commit-and-prove zero-knowledge SNARKs
Progress in Cryptology – AFRICACRYPT 2016
2016-06-22Paper
Efficient culpably sound NIZK shuffle argument without random oracles
Topics in Cryptology - CT-RSA 2016
2016-04-08Paper
Communication optimal Tardos-based asymmetric fingerprinting
Lecture Notes in Computer Science
2016-03-02Paper
Linear batch codes
Coding Theory and Applications
2016-01-07Paper
Efficient NIZK arguments via parallel verification of Beneš networks
Lecture Notes in Computer Science
2014-10-14Paper
Succinct non-interactive zero knowledge arguments from span programs and linear error-correcting codes
Advances in Cryptology - ASIACRYPT 2013
2013-12-10Paper
Secure equality and greater-than tests with sublinear online complexity
Automata, Languages, and Programming
2013-08-07Paper
A more efficient computationally sound non-interactive zero-knowledge shuffle argument
Lecture Notes in Computer Science
2012-09-25Paper
Progression-free sets and sublinear pairing-based non-interactive zero-knowledge arguments
Theory of Cryptography
2012-06-15Paper
On the CCA1-security of Elgamal and Damgård's Elgamal
Information Security and Cryptology
2011-07-29Paper
Secure Vickrey auctions without threshold trust
Financial Cryptography
2011-04-20Paper
Efficient Generalized Selective Private Function Evaluation with Applications in Biometric Authentication
Information Security and Cryptology
2010-11-23Paper
Multi-query Computationally-Private Information Retrieval with Constant Communication Rate
Public Key Cryptography – PKC 2010
2010-05-28Paper
On the feasibility of consistent computations
Public Key Cryptography – PKC 2010
2010-05-28Paper
Verifiable homomorphic oblivious transfer and private equality test
Lecture Notes in Computer Science
2010-01-05Paper
Advances in Cryptology - ASIACRYPT 2003
Lecture Notes in Computer Science
2010-01-05Paper
Public Key Cryptography – PKC 2004
Lecture Notes in Computer Science
2009-05-14Paper
A New Protocol for Conditional Disclosure of Secrets and Its Applications
Applied Cryptography and Network Security
2009-03-10Paper
3-Message NP Arguments in the BPK Model with Optimal Soundness and Zero-Knowledge
Algorithms and Computation
2009-01-29Paper
Hybrid Damgård Is CCA1-Secure under the DDH Assumption
Cryptology and Network Security
2009-01-09Paper
New Communication-Efficient Oblivious Transfer Protocols Based on Pairings
Lecture Notes in Computer Science
2008-11-20Paper
Succinct NP Proofs from an Extractability Assumption
Logic and Theory of Algorithms
2008-06-19Paper
Asymptotic behaviour of a non-commutative rational series with a nonnegative linear representation2008-05-27Paper
Algorithms and Computation
Lecture Notes in Computer Science
2006-11-14Paper
Information and Communications Security
Lecture Notes in Computer Science
2006-10-24Paper
Information and Communications Security
Lecture Notes in Computer Science
2006-10-24Paper
Information Security
Lecture Notes in Computer Science
2006-10-20Paper
Automata, Languages and Programming
Lecture Notes in Computer Science
2006-01-10Paper
Fast Software Encryption
Lecture Notes in Computer Science
2005-12-27Paper
Financial Cryptography and Data Security
Lecture Notes in Computer Science
2005-12-22Paper
Financial Cryptography
Lecture Notes in Computer Science
2005-06-13Paper
scientific article; zbMATH DE number 2089318 (Why is no real title available?)2004-08-12Paper
scientific article; zbMATH DE number 1955781 (Why is no real title available?)2003-07-29Paper
scientific article; zbMATH DE number 1941229 (Why is no real title available?)2003-06-29Paper
scientific article; zbMATH DE number 1941252 (Why is no real title available?)2003-06-29Paper
Secure and efficient time-stamping systems
Dissertationes Mathematicae Universitatis Tartuensis
2002-02-26Paper
scientific article; zbMATH DE number 1440064 (Why is no real title available?)2000-05-07Paper
scientific article; zbMATH DE number 1304123 (Why is no real title available?)1999-08-24Paper
scientific article; zbMATH DE number 1302867 (Why is no real title available?)1999-06-17Paper


Research outcomes over time


This page was built for person: Helger Lipmaa