NIZKs with an Untrusted CRS: Security in the Face of Parameter Subversion

From MaRDI portal
Publication:2953796

DOI10.1007/978-3-662-53890-6_26zbMath1407.94082OpenAlexW3203084829WikidataQ57433759 ScholiaQ57433759MaRDI QIDQ2953796

Georg Fuchsbauer, Mihir Bellare, Alessandra Scafuro

Publication date: 6 January 2017

Published in: Advances in Cryptology – ASIACRYPT 2016 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-662-53890-6_26




Related Items (35)

Multi-party revocation in sovrin: performance through distributed trustUpdateable Inner Product Argument with Logarithmic Verifier and ApplicationsOn QA-NIZK in the BPK ModelPractical witness-key-agreement for blockchain-based dark pools financial tradingSubversion-resistant quasi-adaptive NIZK and applications to modular zk-SNARKsFormal verification of fair exchange based on Bitcoin smart contractsSubversion-resilient enhanced privacy IDA Unified Framework for Non-universal SNARKsVerifiably-Extractable OWFs and Their Applications to Subversion Zero-KnowledgeNIZKs with an Untrusted CRS: Security in the Face of Parameter SubversionOn the security of functional encryption in the generic group modelStructure-preserving signatures on equivalence classes and constant-size anonymous credentialsObtaining simulation extractable NIZKs in the updatable CRS model genericallyCounting vampires: from univariate sumcheck to updatable ZK-SNARKReverse firewalls for adaptively secure MPC without setupGentry-Wichs is tight: a falsifiable non-adaptively sound SNARGSnarky ceremoniesSmooth zero-knowledge hash functionsUpdatable NIZKs from non-interactive zapsSteganography-free zero-knowledgeCRS-updatable asymmetric quasi-adaptive NIZK argumentsSuccinct functional commitment for a large class of arithmetic circuitsCrowd verifiable zero-knowledge and end-to-end verifiable multiparty computationPractical dynamic group signatures without knowledge extractorsCryptographic reverse firewalls for interactive proof systemsImmunization against complete subversion without random oraclesSubversion-resilient signatures: definitions, constructions and applicationsOn subversion-resistant SNARKsHow to extract useful randomness from unreliable sourcesTowards accountability in CRS generationImpossibility on tamper-resilient cryptography with uniqueness propertiesSubversion-resilient public key encryption with practical watchdogsOptimally Sound Sigma Protocols Under DCRANew techniques for zero-knowledge: leveraging inefficient provers to reduce assumptions, interaction, and trustComputational Integrity with a Public Random String from Quasi-Linear PCPs


Uses Software


Cites Work


This page was built for publication: NIZKs with an Untrusted CRS: Security in the Face of Parameter Subversion