Helger Lipmaa

From MaRDI portal
Person:826261

Available identifiers

zbMath Open lipmaa.helgerDBLPl/HelgerLipmaaWikidataQ27430396 ScholiaQ27430396MaRDI QIDQ826261

List of research outcomes





PublicationDate of PublicationType
Polymath: Groth16 is not the limit2025-01-10Paper
Constant-size zk-SNARKs in ROM from falsifiable assumptions2024-11-13Paper
Lookup arguments: improvements, extensions and applications to zero-knowledge decision trees2024-11-12Paper
Set (non-)membership NIZKs from determinantal accumulators2024-10-16Paper
Algebraic group model with oblivious sampling2024-08-15Paper
On black-box knowledge-sound commit-and-prove SNARKs2024-06-26Paper
Counting vampires: from univariate sumcheck to updatable ZK-SNARK2023-08-16Paper
Verifiably-Extractable OWFs and Their Applications to Subversion Zero-Knowledge2023-05-26Paper
Smooth zero-knowledge hash functions2023-05-12Paper
Gentry-Wichs is tight: a falsifiable non-adaptively sound SNARG2023-05-12Paper
Efficient NIZKs for algebraic sets2023-05-12Paper
Succinct functional commitment for a large class of arithmetic circuits2023-03-29Paper
Key-and-argument-updatable QA-NIZKs2022-12-16Paper
On QA-NIZK in the BPK model2022-10-13Paper
A unified framework for non-universal SNARKs2022-07-08Paper
Somewhere statistically binding commitment schemes with applications2022-06-17Paper
More efficient shuffle argument from unique factorization2021-12-20Paper
On subversion-resistant SNARKs2021-07-02Paper
Optimally sound sigma protocols under DCRA2021-03-17Paper
A simpler rate-optimal CPIR protocol2021-03-17Paper
UC-secure CRS generation for SNARKs2020-05-06Paper
DL-extractable UC-commitment schemes2020-01-30Paper
Prover-efficient commit-and-prove zero-knowledge snarks2018-11-26Paper
On the security properties of e-voting bulletin boards2018-10-17Paper
An efficient pairing-based shuffle argument2018-03-08Paper
A subversion-resistant SNARK2018-02-23Paper
CCA-secure inner-product functional encryption from projective hash functions2017-06-13Paper
A shuffle argument secure in the generic model2017-01-06Paper
Prover-efficient commit-and-prove zero-knowledge SNARKs2016-06-22Paper
Efficient culpably sound NIZK shuffle argument without random oracles2016-04-08Paper
Communication optimal Tardos-based asymmetric fingerprinting2016-03-02Paper
Linear batch codes2016-01-07Paper
Efficient NIZK arguments via parallel verification of Beneš networks2014-10-14Paper
Succinct non-interactive zero knowledge arguments from span programs and linear error-correcting codes2013-12-10Paper
Secure equality and greater-than tests with sublinear online complexity2013-08-07Paper
A more efficient computationally sound non-interactive zero-knowledge shuffle argument2012-09-25Paper
Progression-free sets and sublinear pairing-based non-interactive zero-knowledge arguments2012-06-15Paper
On the CCA1-security of Elgamal and Damgård's Elgamal2011-07-29Paper
Secure Vickrey auctions without threshold trust2011-04-20Paper
Efficient Generalized Selective Private Function Evaluation with Applications in Biometric Authentication2010-11-23Paper
Multi-query Computationally-Private Information Retrieval with Constant Communication Rate2010-05-28Paper
On the feasibility of consistent computations2010-05-28Paper
Verifiable homomorphic oblivious transfer and private equality test2010-01-05Paper
Advances in Cryptology - ASIACRYPT 20032010-01-05Paper
Public Key Cryptography – PKC 20042009-05-14Paper
A New Protocol for Conditional Disclosure of Secrets and Its Applications2009-03-10Paper
3-Message NP Arguments in the BPK Model with Optimal Soundness and Zero-Knowledge2009-01-29Paper
Hybrid Damgård Is CCA1-Secure under the DDH Assumption2009-01-09Paper
New Communication-Efficient Oblivious Transfer Protocols Based on Pairings2008-11-20Paper
Succinct NP Proofs from an Extractability Assumption2008-06-19Paper
Asymptotic behaviour of a non-commutative rational series with a nonnegative linear representation2008-05-27Paper
Algorithms and Computation2006-11-14Paper
Information and Communications Security2006-10-24Paper
Information and Communications Security2006-10-24Paper
Information Security2006-10-20Paper
Automata, Languages and Programming2006-01-10Paper
Fast Software Encryption2005-12-27Paper
Financial Cryptography and Data Security2005-12-22Paper
Financial Cryptography2005-06-13Paper
https://portal.mardi4nfdi.de/entity/Q30466202004-08-12Paper
https://portal.mardi4nfdi.de/entity/Q44173912003-07-29Paper
https://portal.mardi4nfdi.de/entity/Q44084152003-06-29Paper
https://portal.mardi4nfdi.de/entity/Q44084562003-06-29Paper
Secure and efficient time-stamping systems2002-02-26Paper
https://portal.mardi4nfdi.de/entity/Q49500522000-05-07Paper
https://portal.mardi4nfdi.de/entity/Q42508211999-08-24Paper
https://portal.mardi4nfdi.de/entity/Q42493531999-06-17Paper

Research outcomes over time

This page was built for person: Helger Lipmaa