NIZKs with an Untrusted CRS: Security in the Face of Parameter Subversion

From MaRDI portal
Publication:2953796


DOI10.1007/978-3-662-53890-6_26zbMath1407.94082OpenAlexW3203084829WikidataQ57433759 ScholiaQ57433759MaRDI QIDQ2953796

Georg Fuchsbauer, Mihir Bellare, Alessandra Scafuro

Publication date: 6 January 2017

Published in: Advances in Cryptology – ASIACRYPT 2016 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-662-53890-6_26



Related Items

Multi-party revocation in sovrin: performance through distributed trust, Updateable Inner Product Argument with Logarithmic Verifier and Applications, On QA-NIZK in the BPK Model, Practical witness-key-agreement for blockchain-based dark pools financial trading, Subversion-resistant quasi-adaptive NIZK and applications to modular zk-SNARKs, Formal verification of fair exchange based on Bitcoin smart contracts, Subversion-resilient enhanced privacy ID, A Unified Framework for Non-universal SNARKs, Verifiably-Extractable OWFs and Their Applications to Subversion Zero-Knowledge, NIZKs with an Untrusted CRS: Security in the Face of Parameter Subversion, On the security of functional encryption in the generic group model, Structure-preserving signatures on equivalence classes and constant-size anonymous credentials, Obtaining simulation extractable NIZKs in the updatable CRS model generically, Counting vampires: from univariate sumcheck to updatable ZK-SNARK, Reverse firewalls for adaptively secure MPC without setup, Gentry-Wichs is tight: a falsifiable non-adaptively sound SNARG, Snarky ceremonies, Smooth zero-knowledge hash functions, Updatable NIZKs from non-interactive zaps, Steganography-free zero-knowledge, CRS-updatable asymmetric quasi-adaptive NIZK arguments, Succinct functional commitment for a large class of arithmetic circuits, Crowd verifiable zero-knowledge and end-to-end verifiable multiparty computation, Practical dynamic group signatures without knowledge extractors, Cryptographic reverse firewalls for interactive proof systems, Immunization against complete subversion without random oracles, Subversion-resilient signatures: definitions, constructions and applications, On subversion-resistant SNARKs, How to extract useful randomness from unreliable sources, Towards accountability in CRS generation, Impossibility on tamper-resilient cryptography with uniqueness properties, Subversion-resilient public key encryption with practical watchdogs, Optimally Sound Sigma Protocols Under DCRA, New techniques for zero-knowledge: leveraging inefficient provers to reduce assumptions, interaction, and trust, Computational Integrity with a Public Random String from Quasi-Linear PCPs


Uses Software


Cites Work