Helger Lipmaa

From MaRDI portal
Person:826261

Available identifiers

zbMath Open lipmaa.helgerDBLPl/HelgerLipmaaWikidataQ27430396 ScholiaQ27430396MaRDI QIDQ826261

List of research outcomes





PublicationDate of PublicationType
Polymath: Groth16 is not the limit2025-01-10Paper
Constant-size zk-SNARKs in ROM from falsifiable assumptions2024-11-13Paper
Lookup arguments: improvements, extensions and applications to zero-knowledge decision trees2024-11-12Paper
Set (non-)membership NIZKs from determinantal accumulators2024-10-16Paper
Algebraic group model with oblivious sampling2024-08-15Paper
On black-box knowledge-sound commit-and-prove SNARKs2024-06-26Paper
Counting vampires: from univariate sumcheck to updatable ZK-SNARK2023-08-16Paper
Verifiably-Extractable OWFs and Their Applications to Subversion Zero-Knowledge2023-05-26Paper
Smooth zero-knowledge hash functions2023-05-12Paper
Gentry-Wichs is tight: a falsifiable non-adaptively sound SNARG2023-05-12Paper
Efficient NIZKs for algebraic sets2023-05-12Paper
Succinct functional commitment for a large class of arithmetic circuits2023-03-29Paper
Key-and-argument-updatable QA-NIZKs2022-12-16Paper
On QA-NIZK in the BPK Model2022-10-13Paper
A Unified Framework for Non-universal SNARKs2022-07-08Paper
Somewhere statistically binding commitment schemes with applications2022-06-17Paper
More efficient shuffle argument from unique factorization2021-12-20Paper
On subversion-resistant SNARKs2021-07-02Paper
Optimally Sound Sigma Protocols Under DCRA2021-03-17Paper
A Simpler Rate-Optimal CPIR Protocol2021-03-17Paper
UC-secure CRS generation for SNARKs2020-05-06Paper
DL-extractable UC-commitment schemes2020-01-30Paper
Prover-efficient commit-and-prove zero-knowledge snarks2018-11-26Paper
On the security properties of e-voting bulletin boards2018-10-17Paper
An efficient pairing-based shuffle argument2018-03-08Paper
A subversion-resistant SNARK2018-02-23Paper
CCA-Secure Inner-Product Functional Encryption from Projective Hash Functions2017-06-13Paper
A Shuffle Argument Secure in the Generic Model2017-01-06Paper
Prover-Efficient Commit-and-Prove Zero-Knowledge SNARKs2016-06-22Paper
Efficient Culpably Sound NIZK Shuffle Argument Without Random Oracles2016-04-08Paper
Communication Optimal Tardos-Based Asymmetric Fingerprinting2016-03-02Paper
Linear Batch Codes2016-01-07Paper
Efficient NIZK Arguments via Parallel Verification of Benes Networks2014-10-14Paper
Succinct Non-Interactive Zero Knowledge Arguments from Span Programs and Linear Error-Correcting Codes2013-12-10Paper
Secure Equality and Greater-Than Tests with Sublinear Online Complexity2013-08-07Paper
A More Efficient Computationally Sound Non-Interactive Zero-Knowledge Shuffle Argument2012-09-25Paper
Progression-Free Sets and Sublinear Pairing-Based Non-Interactive Zero-Knowledge Arguments2012-06-15Paper
On the CCA1-Security of Elgamal and Damgård’s Elgamal2011-07-29Paper
Secure Vickrey auctions without threshold trust2011-04-20Paper
Efficient Generalized Selective Private Function Evaluation with Applications in Biometric Authentication2010-11-23Paper
Multi-query Computationally-Private Information Retrieval with Constant Communication Rate2010-05-28Paper
On the feasibility of consistent computations2010-05-28Paper
Verifiable homomorphic oblivious transfer and private equality test2010-01-05Paper
Advances in Cryptology - ASIACRYPT 20032010-01-05Paper
Public Key Cryptography – PKC 20042009-05-14Paper
A New Protocol for Conditional Disclosure of Secrets and Its Applications2009-03-10Paper
3-Message NP Arguments in the BPK Model with Optimal Soundness and Zero-Knowledge2009-01-29Paper
Hybrid Damgård Is CCA1-Secure under the DDH Assumption2009-01-09Paper
New Communication-Efficient Oblivious Transfer Protocols Based on Pairings2008-11-20Paper
Succinct NP Proofs from an Extractability Assumption2008-06-19Paper
Asymptotic behaviour of a non-commutative rational series with a nonnegative linear representation2008-05-27Paper
Algorithms and Computation2006-11-14Paper
Information and Communications Security2006-10-24Paper
Information and Communications Security2006-10-24Paper
Information Security2006-10-20Paper
Automata, Languages and Programming2006-01-10Paper
Fast Software Encryption2005-12-27Paper
Financial Cryptography and Data Security2005-12-22Paper
Financial Cryptography2005-06-13Paper
https://portal.mardi4nfdi.de/entity/Q30466202004-08-12Paper
https://portal.mardi4nfdi.de/entity/Q44173912003-07-29Paper
https://portal.mardi4nfdi.de/entity/Q44084152003-06-29Paper
https://portal.mardi4nfdi.de/entity/Q44084562003-06-29Paper
Secure and efficient time-stamping systems2002-02-26Paper
https://portal.mardi4nfdi.de/entity/Q49500522000-05-07Paper
https://portal.mardi4nfdi.de/entity/Q42508211999-08-24Paper
https://portal.mardi4nfdi.de/entity/Q42493531999-06-17Paper

Research outcomes over time

This page was built for person: Helger Lipmaa