NIZK from LPN and trapdoor hash via correlation intractability for approximable relations
From MaRDI portal
Publication:2104241
DOI10.1007/978-3-030-56877-1_26zbMath1504.94110OpenAlexW3013660109MaRDI QIDQ2104241
Zvika Brakerski, Tamer Mour, Venkata Koppula
Publication date: 7 December 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-56877-1_26
Related Items
Does Fiat-Shamir require a cryptographic hash function? ⋮ Non-interactive batch arguments for NP from standard assumptions ⋮ One-shot Fiat-Shamir-based NIZK arguments of composite residuosity and logarithmic-size ring signatures in the standard model ⋮ SNARGs for P from sub-exponential DDH and QR ⋮ SNARGs and PPAD hardness from the decisional Diffie-Hellman assumption ⋮ A generic transform from multi-round interactive proof to NIZK ⋮ Triply adaptive UC NIZK ⋮ Efficient NIZKs from LWE via polynomial reconstruction and ``MPC in the head ⋮ Statistically sender-private OT from LPN and derandomization ⋮ PPAD is as hard as LWE and iterated squaring ⋮ Universal ring signatures in the standard model ⋮ A framework for statistically sender private OT with optimal rate ⋮ Non-interactive zero-knowledge from non-interactive batch arguments ⋮ Correlation intractability and SNARGs from sub-exponential DDH ⋮ A note on non-interactive zero-knowledge from CDH ⋮ Secure computation with shared EPR pairs (or: how to teleport in zero-knowledge) ⋮ Amortizing rate-1 OT and applications to PIR and PSI ⋮ Compact designated verifier NIZKs from the CDH assumption without pairings ⋮ Non-interactive zero knowledge from sub-exponential DDH ⋮ NIZK from LPN and trapdoor hash via correlation intractability for approximable relations
Cites Work
- Fiat-Shamir and correlation intractability from strong KDM-secure encryption
- From obfuscation to the security of Fiat-Shamir for proofs
- NIZK from LPN and trapdoor hash via correlation intractability for approximable relations
- Noninteractive zero knowledge for NP from (Plain) Learning With Errors
- Trapdoor hash functions and their applications
- The random oracle methodology, revisited
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- Multiple NonInteractive Zero Knowledge Proofs Under General Assumptions
- The knowledge complexity of interactive proof-systems
- Fiat-Shamir: from practice to theory
- How to use indistinguishability obfuscation
- New Techniques for Noninteractive Zero-Knowledge
- Theory of Cryptography
- Unnamed Item
- Unnamed Item