Non-interactive batch arguments for NP from standard assumptions
From MaRDI portal
Publication:2139642
Recommendations
- Batch arguments for \textsf{NP} and more from standard bilinear group assumptions
- Fully succinct batch arguments for \textsf{NP} from indistinguishability obfuscation
- Non-interactive delegation and batch NP verification from standard computational assumptions
- Perfect Non-interactive Zero Knowledge for NP
- Multiple NonInteractive Zero Knowledge Proofs Under General Assumptions
Cites work
- scientific article; zbMATH DE number 1261806 (Why is no real title available?)
- scientific article; zbMATH DE number 7250162 (Why is no real title available?)
- Advances in Cryptology - CRYPTO 2003
- Algebraic methods for interactive proof systems
- Anonymous IBE, leakage resilience and circular security from new assumptions
- Batch verification and proofs of proximity with polylog overhead
- Batch verification for statistical zero knowledge proofs
- Batch verification of short signatures
- Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability
- Constant-round interactive proofs for delegating computation
- Fiat-Shamir and correlation intractability from strong KDM-secure encryption
- Fiat-Shamir for repeated squaring with applications to PPAD-hardness and VDFs
- Fiat-Shamir: from practice to theory
- Finding a Nash equilibrium is no easier than breaking Fiat-Shamir
- From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again
- From obfuscation to the security of Fiat-Shamir for proofs
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- How to delegate computations publicly
- IP = PSPACE
- Identity-based encryption from the Diffie-Hellman assumption
- Indistinguishability obfuscation for Turing machines with unbounded memory
- NIZK from LPN and trapdoor hash via correlation intractability for approximable relations
- New constructions of identity-based and key-dependent message secure encryption schemes
- New realizations of somewhere statistically binding hashing and positional accumulators
- Non-interactive delegation and batch NP verification from standard computational assumptions
- Non-interactive zero knowledge from sub-exponential DDH
- Non-interactive zero-knowledge in pairing-free groups from weaker assumptions
- Noninteractive zero knowledge for NP from (Plain) Learning With Errors
- On adaptive security of delayed-input sigma protocols and Fiat-Shamir NIZKs
- On interactive proofs with a laconic prover
- On the (In)security of Kilian-based SNARGs
- On the communication complexity of secure function evaluation with long output
- On the complexity of interactive proofs with bounded communication
- Public-coin statistical zero-knowledge batch verification against malicious verifiers
- Recursive composition and bootstrapping for SNARKs and proof-carrying data
- SNARGs for bounded depth computations and PPAD hardness from sub-exponential LWE
- Secure two-party computation with low communication
- Separating succinct non-interactive arguments from all falsifiable assumptions
- Spartan: efficient and general-purpose zkSNARKs without trusted setup
- The random oracle methodology, revisited.
- Trapdoor functions from the computational Diffie-Hellman assumption
- Trapdoor hash functions and their applications
Cited in
(28)- Batch Processing of Interactive Proofs
- A simple and efficient framework of proof systems for NP
- Non-interactive universal arguments
- SNARGs for monotone policy batch NP
- Non-interactive delegation and batch NP verification from standard computational assumptions
- Locally verifiable distributed SNARGs
- On black-box verifiable outsourcing
- Holographic SNARGs for P and batch-NP from (polynomially hard) learning with errors
- Triply adaptive UC NIZK
- Batch arguments for \textsf{NP} and more from standard bilinear group assumptions
- Non-interactive zero-knowledge from non-interactive batch arguments
- Non-interactive publicly-verifiable delegation of committed programs
- On Valiant's conjecture. Impossibility of incrementally verifiable computation from random oracles
- Correlation intractability and SNARGs from sub-exponential DDH
- Secure computation with shared EPR pairs (or: how to teleport in zero-knowledge)
- SNARGs and PPAD hardness from the decisional Diffie-Hellman assumption
- SNARGs for P from sub-exponential DDH and QR
- PPAD is as hard as LWE and iterated squaring
- Rate-1 fully local somewhere extractable hashing from DDH
- Monotone-policy aggregate signatures
- Strong batching for non-interactive statistical zero-knowledge
- Fully-succinct multi-key homomorphic signatures from standard assumptions
- Non-interactive zero-knowledge from LPN and MQ
- Boosting batch arguments and RAM delegation
- Constant-round arguments from one-way functions
- When Arthur has neither random coins nor time to spare: superfast derandomization of proof systems
- Constant-round arguments for batch-verification and bounded-space computations from one-way functions
- Fully succinct batch arguments for \textsf{NP} from indistinguishability obfuscation
This page was built for publication: Non-interactive batch arguments for NP from standard assumptions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2139642)