Helger Lipmaa

From MaRDI portal
Person:826261


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Polymath: Groth16 is not the limit
 
2025-01-10Paper
Constant-size zk-SNARKs in ROM from falsifiable assumptions
 
2024-11-13Paper
Lookup arguments: improvements, extensions and applications to zero-knowledge decision trees
 
2024-11-12Paper
Set (non-)membership NIZKs from determinantal accumulators
 
2024-10-16Paper
Algebraic group model with oblivious sampling
 
2024-08-15Paper
On black-box knowledge-sound commit-and-prove SNARKs
 
2024-06-26Paper
Counting vampires: from univariate sumcheck to updatable ZK-SNARK
Advances in Cryptology – ASIACRYPT 2022
2023-08-16Paper
Verifiably-Extractable OWFs and Their Applications to Subversion Zero-Knowledge
Lecture Notes in Computer Science
2023-05-26Paper
Smooth zero-knowledge hash functions
Lecture Notes in Computer Science
2023-05-12Paper
Gentry-Wichs is tight: a falsifiable non-adaptively sound SNARG
Lecture Notes in Computer Science
2023-05-12Paper
Efficient NIZKs for algebraic sets
Lecture Notes in Computer Science
2023-05-12Paper
Succinct functional commitment for a large class of arithmetic circuits
 
2023-03-29Paper
Key-and-argument-updatable QA-NIZKs
 
2022-12-16Paper
On QA-NIZK in the BPK model
Lecture Notes in Computer Science
2022-10-13Paper
A unified framework for non-universal SNARKs
Public-Key Cryptography – PKC 2022
2022-07-08Paper
Somewhere statistically binding commitment schemes with applications
 
2022-06-17Paper
More efficient shuffle argument from unique factorization
 
2021-12-20Paper
On subversion-resistant SNARKs
Journal of Cryptology
2021-07-02Paper
Optimally sound sigma protocols under DCRA
Financial Cryptography and Data Security
2021-03-17Paper
A simpler rate-optimal CPIR protocol
Financial Cryptography and Data Security
2021-03-17Paper
UC-secure CRS generation for SNARKs
 
2020-05-06Paper
DL-extractable UC-commitment schemes
 
2020-01-30Paper
Prover-efficient commit-and-prove zero-knowledge snarks
International Journal of Applied Cryptography
2018-11-26Paper
On the security properties of e-voting bulletin boards
 
2018-10-17Paper
An efficient pairing-based shuffle argument
 
2018-03-08Paper
A subversion-resistant SNARK
 
2018-02-23Paper
CCA-secure inner-product functional encryption from projective hash functions
Lecture Notes in Computer Science
2017-06-13Paper
A shuffle argument secure in the generic model
Advances in Cryptology – ASIACRYPT 2016
2017-01-06Paper
Prover-efficient commit-and-prove zero-knowledge SNARKs
Progress in Cryptology – AFRICACRYPT 2016
2016-06-22Paper
Efficient culpably sound NIZK shuffle argument without random oracles
Topics in Cryptology - CT-RSA 2016
2016-04-08Paper
Communication optimal Tardos-based asymmetric fingerprinting
Lecture Notes in Computer Science
2016-03-02Paper
Linear batch codes
Coding Theory and Applications
2016-01-07Paper
Efficient NIZK arguments via parallel verification of Beneš networks
Lecture Notes in Computer Science
2014-10-14Paper
Succinct non-interactive zero knowledge arguments from span programs and linear error-correcting codes
Advances in Cryptology - ASIACRYPT 2013
2013-12-10Paper
Secure equality and greater-than tests with sublinear online complexity
Automata, Languages, and Programming
2013-08-07Paper
A more efficient computationally sound non-interactive zero-knowledge shuffle argument
Lecture Notes in Computer Science
2012-09-25Paper
Progression-free sets and sublinear pairing-based non-interactive zero-knowledge arguments
Theory of Cryptography
2012-06-15Paper
On the CCA1-security of Elgamal and Damgård's Elgamal
Information Security and Cryptology
2011-07-29Paper
Secure Vickrey auctions without threshold trust
Financial Cryptography
2011-04-20Paper
Efficient Generalized Selective Private Function Evaluation with Applications in Biometric Authentication
Information Security and Cryptology
2010-11-23Paper
Multi-query Computationally-Private Information Retrieval with Constant Communication Rate
Public Key Cryptography – PKC 2010
2010-05-28Paper
On the feasibility of consistent computations
Public Key Cryptography – PKC 2010
2010-05-28Paper
Verifiable homomorphic oblivious transfer and private equality test
Lecture Notes in Computer Science
2010-01-05Paper
Advances in Cryptology - ASIACRYPT 2003
Lecture Notes in Computer Science
2010-01-05Paper
Public Key Cryptography – PKC 2004
Lecture Notes in Computer Science
2009-05-14Paper
A New Protocol for Conditional Disclosure of Secrets and Its Applications
Applied Cryptography and Network Security
2009-03-10Paper
3-Message NP Arguments in the BPK Model with Optimal Soundness and Zero-Knowledge
Algorithms and Computation
2009-01-29Paper
Hybrid Damgård Is CCA1-Secure under the DDH Assumption
Cryptology and Network Security
2009-01-09Paper
New Communication-Efficient Oblivious Transfer Protocols Based on Pairings
Lecture Notes in Computer Science
2008-11-20Paper
Succinct NP Proofs from an Extractability Assumption
Logic and Theory of Algorithms
2008-06-19Paper
Asymptotic behaviour of a non-commutative rational series with a nonnegative linear representation
 
2008-05-27Paper
Algorithms and Computation
Lecture Notes in Computer Science
2006-11-14Paper
Information and Communications Security
Lecture Notes in Computer Science
2006-10-24Paper
Information and Communications Security
Lecture Notes in Computer Science
2006-10-24Paper
Information Security
Lecture Notes in Computer Science
2006-10-20Paper
Automata, Languages and Programming
Lecture Notes in Computer Science
2006-01-10Paper
Fast Software Encryption
Lecture Notes in Computer Science
2005-12-27Paper
Financial Cryptography and Data Security
Lecture Notes in Computer Science
2005-12-22Paper
Financial Cryptography
Lecture Notes in Computer Science
2005-06-13Paper
scientific article; zbMATH DE number 2089318 (Why is no real title available?)
 
2004-08-12Paper
scientific article; zbMATH DE number 1955781 (Why is no real title available?)
 
2003-07-29Paper
scientific article; zbMATH DE number 1941229 (Why is no real title available?)
 
2003-06-29Paper
scientific article; zbMATH DE number 1941252 (Why is no real title available?)
 
2003-06-29Paper
Secure and efficient time-stamping systems
Dissertationes Mathematicae Universitatis Tartuensis
2002-02-26Paper
scientific article; zbMATH DE number 1440064 (Why is no real title available?)
 
2000-05-07Paper
scientific article; zbMATH DE number 1304123 (Why is no real title available?)
 
1999-08-24Paper
scientific article; zbMATH DE number 1302867 (Why is no real title available?)
 
1999-06-17Paper


Research outcomes over time


This page was built for person: Helger Lipmaa