Constant-Size Commitments to Polynomials and Their Applications
From MaRDI portal
Publication:3058656
DOI10.1007/978-3-642-17373-8_11zbMATH Open1253.94054OpenAlexW1909324101MaRDI QIDQ3058656FDOQ3058656
Authors: Aniket Kate, Gregory M. Zaverucha, Ian Goldberg
Publication date: 7 December 2010
Published in: Advances in Cryptology - ASIACRYPT 2010 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-17373-8_11
Recommendations
- Private polynomial commitments and applications to MPC
- Succinct vector, polynomial, and functional commitments from lattices
- \textsf{Dew}: a transparent constant-sized polynomial commitment scheme
- Functional commitment schemes: from polynomial commitments to pairing-based accumulators from simple assumptions
- Efficient Constructions of Composable Commitments and Zero-Knowledge Proofs
- scientific article; zbMATH DE number 2086626
- Polynomial-Space Approximation of No-Signaling Provers
- The complexity of promise problems with applications to public-key cryptography
- On fixed-polynomial size circuit lower bounds for uniform polynomials in the sense of Valiant
- On fixed-polynomial size circuit lower bounds for uniform polynomials in the sense of Valiant
Cited In (only showing first 100 items - show all)
- ECLIPSE: Enhanced Compiling Method for Pedersen-Committed zkSNARK Engines
- Polynomial IOPs for Linear Algebra Relations
- Polynomial-Space Approximation of No-Signaling Provers
- \textsf{Halo Infinite}: proof-carrying data from additive polynomial commitments
- An algebraic framework for universal and updatable SNARKs
- Improved extension protocols for Byzantine broadcast and agreement
- Time- and space-efficient arguments from groups of unknown order
- Storing and Retrieving Secrets on a Blockchain
- Trusted computing with addition machines. II
- Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification
- KDM security for the Fujisaki-Okamoto transformations in the QROM
- SnarkPack: practical SNARK aggregation
- SoK: blockchain light clients
- Verifiable Inner Product Encryption Scheme
- Private polynomial commitments and applications to MPC
- Logarithmic-size (linkable) threshold ring signatures in the plain model
- Proofs for inner pairing products and applications
- Structure-preserving signatures on equivalence classes and constant-size anonymous credentials
- Zero-Knowledge Authenticated Order Queries and Order Statistics on a List
- HyperPlonk: Plonk with linear-time prover and high-degree custom gates
- Witness-succinct universally-composable SNARKs
- What makes Fiat-Shamir zkSNARKs (updatable SRS) simulation extractable?
- \(\mathcal{Lunar}\): a toolbox for more efficient universal and updatable zkSNARKs and commit-and-prove extensions
- Nova: recursive zero-knowledge arguments from folding schemes
- Zero-knowledge for homomorphic key-value commitments with applications to privacy-preserving ledgers
- Succinct vector, polynomial, and functional commitments from lattices
- Linear-map vector commitments and their practical applications
- Improved threshold signatures, proactive secret sharing, and input certification from LSS isomorphisms
- High-threshold AVSS with optimal communication complexity
- A survey of elliptic curves for proof systems
- Proving knowledge of isogenies: a survey
- Functional commitments for all functions, with transparent setup and from SIS
- Revisiting Cryptographic Accumulators, Additional Properties and Relations to Other Primitives
- Lattice-based SNARKs: publicly verifiable, preprocessing, and recursively composable (extended abstract)
- Additive-homomorphic functional commitments and applications to homomorphic signatures
- An Efficient and Provably Secure Private Polynomial Evaluation Scheme
- \textsf{Dew}: a transparent constant-sized polynomial commitment scheme
- Decentralized policy-hiding ABE with receiver privacy
- Guaranteed output in \(O(\sqrt{n})\) rounds for round-robin sampling protocols
- Families of SNARK-friendly 2-chains of elliptic curves
- Gemini: elastic SNARKs for diverse environments
- Incrementally aggregatable vector commitments and applications to verifiable decentralized storage
- Boosting verifiable computation on encrypted data
- Transparent SNARKs from DARK compilers
- Spartan: efficient and general-purpose zkSNARKs without trusted setup
- Aggregatable distributed key generation
- Improved Constructions of Anonymous Credentials from Structure-Preserving Signatures on Equivalence Classes
- UC Updatable Databases and Applications
- Dory: efficient, transparent arguments for generalised inner products and polynomial commitments
- Constant Size Ring Signature Without Random Oracle
- Succinct functional commitment for a large class of arithmetic circuits
- A position-aware Merkle tree for dynamic cloud data integrity verification
- Vector Commitments and Their Applications
- Vector and functional commitments from lattices
- MoniPoly -- an expressive \(q\)-SDH-based anonymous attribute-based credential system
- Marlin: preprocessing zkSNARKs with universal and updatable SRS
- Efficient transparent polynomial commitments for zk-SNARKs
- Fiat-Shamir security of FRI and related SNARKs
- On black-box knowledge-sound commit-and-prove SNARKs
- Polynomial IOPs for memory consistency checks in zero-knowledge virtual machines
- Brakedown: linear-time and field-agnostic SNARKs for R1CS
- Cryptoeconomic security for data availability committees
- Proof of necessary work: succinct state verification with fairness guarantees
- Distributed-prover interactive proofs
- Chainable functional commitments for unbounded-depth circuits
- From polynomial IOP and commitments to non-malleable zkSNARKs
- How to compile polynomial IOP into simulation-extractable SNARKs: a modular approach
- Algebraic group model with oblivious sampling
- Lattice-based polynomial commitments: towards asymptotic and concrete efficiency
- Lattice-based functional commitments: fast verification and cryptanalysis
- Cuckoo commitments: registration-based encryption and key-value map commitments for large spaces
- PointProofs, revisited
- \textsf{Bingo}: adaptivity and asynchrony in verifiable secret sharing and distributed key generation
- \textsf{Orbweaver}: succinct linear functional commitments from lattices
- Revisiting cycles of pairing-friendly elliptic curves
- Towards zero knowledge argument for double discrete logarithm with constant cost
- \textsf{Testudo}: linear time prover SNARKs with constant size proofs and square root size universal setup
- Benchmarking the setup of updatable zk-SNARKs
- Folding schemes with selective verification
- On the impossibility of algebraic NIZK in pairing-free groups
- eSTARK: extending STARKs with arguments
- Lookup arguments: improvements, extensions and applications to zero-knowledge decision trees
- Simulation-extractable KZG polynomial commitments and applications to HyperPlonk
- Vector commitments with proofs of smallness: short range proofs and more
- Efficient KZG-based univariate sum-check and lookup argument
- Succinct functional commitments for circuits from \(k\)-\textsf{Lin}
- \textsf{Jolt}: SNARKs for virtual machines via lookups
- Constant-size zk-SNARKs in ROM from falsifiable assumptions
- Public-coin, complexity-preserving, succinct arguments of knowledge for NP from collision-resistance
- SPRINT: high-throughput robust distributed Schnorr signatures
- Unlocking the lookup singularity with \textsf{Lasso}
- SLAP: succinct lattice-based polynomial commitments from standard assumptions
- \textsc{Zeromorph}: zero-knowledge multilinear-evaluation proofs from homomorphic univariate commitments
- Inner product functional commitments with constant-size public parameters and openings
- Concise Mercurial Subvector Commitments: Definitions and Constructions
- Advancing scalability in decentralized storage: a novel approach to proof-of-replication via polynomial evaluation
- Loquat: a SNARK-friendly post-quantum signature based on the Legendre PRF with applications in ring and aggregate signatures
- Functional commitments for arbitrary circuits of bounded sizes
- FRIDA: data availability sampling from FRI
- Threshold encryption with silent setup
This page was built for publication: Constant-Size Commitments to Polynomials and Their Applications
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3058656)