The algebraic group model and its applications
From MaRDI portal
(Redirected from Publication:1784081)
Recommendations
- On instantiating the algebraic group model from falsifiable assumptions
- An analysis of the algebraic group model
- The Semi-Generic Group Model and Applications to Pairing-Based Cryptography
- Tight reductions for Diffie-Hellman variants in the algebraic group model
- On the Equivalence of Generic Group Models
Cited in
(only showing first 100 items - show all)- Non-interactive half-aggregation of EdDSA and variants of Schnorr signatures
- To label, or not to label (in generic groups)
- Counting vampires: from univariate sumcheck to updatable ZK-SNARK
- Generically speeding-up repeated squaring is equivalent to factoring: sharp thresholds for all generic-ring delay functions
- Shorter non-interactive zero-knowledge arguments and ZAPs for algebraic languages
- MuSig2: simple two-round Schnorr multi-signatures
- NIWI and new notions of extraction for algebraic languages
- Non-interactive Mimblewimble transactions, revisited
- A unified framework for non-universal SNARKs
- Fine-grained non-interactive key-exchange: constructions and lower bounds
- An efficient strong asymmetric PAKE compiler instantiable from group actions
- On black-box knowledge-sound commit-and-prove SNARKs
- Predicate aggregate signatures and applications
- Threshold structure-preserving signatures
- The price of verifiability: lower bounds for verifiable random functions
- Memory-tight multi-challenge security of public-key encryption
- Algebraic distinguishers: from discrete logarithms to decisional Uber assumptions
- \textsf{Halo Infinite}: proof-carrying data from additive polynomial commitments
- An algebraic framework for universal and updatable SNARKs
- Tighter security for Schnorr identification and signatures: a high-moment forking lemma for \({\varSigma }\)-protocols
- Two-round trip Schnorr multi-signatures via delinearized witnesses
- Tighter security for Schnorr identification and signatures: a high-moment forking lemma for \(\Sigma\)-protocols
- Bicorn: an optimistically efficient distributed randomness beacon
- Rogue-instance security for batch knowledge proofs
- scientific article; zbMATH DE number 1263606 (Why is no real title available?)
- Snarky ceremonies
- Generic-group lower bounds via reductions between geometric-search problems: with and without preprocessing
- From polynomial IOP and commitments to non-malleable zkSNARKs
- Non-malleable codes for bounded parallel-time tampering
- Tight state-restoration soundness in the algebraic group model
- Algebraic group model with oblivious sampling
- Limits in the provable security of ECDSA signatures
- The One-More Discrete Logarithm Assumption in the Generic Group Model
- Plumo: an ultralight blockchain client
- Blind Schnorr signatures and signed ElGamal encryption in the algebraic group model
- The multi-base discrete logarithm problem: tight reductions and non-rewinding proofs for Schnorr identification and signatures
- Pointcheval-Sanders signature-based synchronized aggregate signature
- Smooth zero-knowledge hash functions
- Practical and efficient FHE-based MPC
- CRS-updatable asymmetric quasi-adaptive NIZK arguments
- Beyond Uber: instantiating generic groups via PGGs
- Proofs for inner pairing products and applications
- Composition with knowledge assumptions
- Another look at extraction and randomization of Groth's zk-SNARK
- Succinct publicly-certifiable proofs. Or, can a blockchain verify a designated-verifier proof?
- PointProofs, revisited
- \textsf{ECLIPSE}: enhanced compiling method for Pedersen-committed zkSNARK engines
- Spartan and bulletproofs are simulation-extractable (for free!)
- Witness-succinct universally-composable SNARKs
- What makes Fiat-Shamir zkSNARKs (updatable SRS) simulation extractable?
- Versatile and sustainable timed-release encryption and sequential time-lock puzzles (extended abstract)
- \(\mathcal{Lunar}\): a toolbox for more efficient universal and updatable zkSNARKs and commit-and-prove extensions
- Algebraic adversaries in the universal composability framework
- Gentry-Wichs is tight: a falsifiable non-adaptively sound SNARG
- On QA-NIZK in the BPK model
- On subversion-resistant SNARKs
- Linear-map vector commitments and their practical applications
- \textsf{Bingo}: adaptivity and asynchrony in verifiable secret sharing and distributed key generation
- Fully adaptive Schnorr threshold signatures
- Practical Schnorr threshold signatures without the algebraic group model
- Snowblind: a threshold blind signature in pairing-free groups
- Towards zero knowledge argument for double discrete logarithm with constant cost
- Subversion-resistant quasi-adaptive NIZK and applications to modular zk-SNARKs
- The algebra of marriage: an episode in applied group theory
- A non-PCP approach to succinct quantum-safe zero-knowledge
- Tracing a linear subspace: application to linearly-homomorphic group signatures
- Algebraic reductions of knowledge
- Lookup arguments: improvements, extensions and applications to zero-knowledge decision trees
- Simulation-extractable KZG polynomial commitments and applications to HyperPlonk
- Threshold structure-preserving signatures: strong and adaptive security under standard assumptions
- Vector commitments with proofs of smallness: short range proofs and more
- Witness encryption for succinct functional commitments and applications
- Guaranteed output in \(O(\sqrt{n})\) rounds for round-robin sampling protocols
- Fiat-Shamir bulletproofs are non-malleable (in the algebraic group model)
- Optimal tightness for chain-based unique signatures
- Short pairing-free blind signatures with exponential security
- Everybody's a target: scalability in public-key encryption
- On the memory-tightness of hashed ElGamal
- Rai-Choo! Evolving blind signatures to the next level
- Revisiting BBS signatures
- Threshold and multi-signature schemes from linear hash functions
- Chain Reductions for Multi-signatures and the HBMS Scheme
- PI-Cut-Choo and friends: compact blind signatures via parallel instance cut-and-choose and more
- Concurrently secure blind Schnorr signatures
- Lower bounds for lattice-based compact functional encryption
- Toothpicks: more efficient fork-free two-round multi-signatures
- Twinkle: threshold signatures from DDH with full adaptive security
- A holistic security analysis of Monero transactions
- Constant-size zk-SNARKs in ROM from falsifiable assumptions
- New limits of provable security and applications to ElGamal encryption
- Unbiasable verifiable random functions
- Updatable public-key encryption, revisited
- \textsc{Zeromorph}: zero-knowledge multilinear-evaluation proofs from homomorphic univariate commitments
- Better than advertised security for non-interactive threshold signatures
- A fast and simple partially oblivious PRF, with applications
- Tight reductions for Diffie-Hellman variants in the algebraic group model
- Concise Mercurial Subvector Commitments: Definitions and Constructions
- Updatable Trapdoor SPHFs: Modular Construction of Updatable Zero-Knowledge Arguments and More
- On the unforgeability of the Chaum-Pedersen blind signature scheme
- Fine-grained non-interactive key-exchange without idealized assumptions
This page was built for publication: The algebraic group model and its applications
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1784081)