Constant-Size Commitments to Polynomials and Their Applications
From MaRDI portal
Publication:3058656
Recommendations
- Private polynomial commitments and applications to MPC
- Succinct vector, polynomial, and functional commitments from lattices
- \textsf{Dew}: a transparent constant-sized polynomial commitment scheme
- Functional commitment schemes: from polynomial commitments to pairing-based accumulators from simple assumptions
- Efficient Constructions of Composable Commitments and Zero-Knowledge Proofs
- scientific article; zbMATH DE number 2086626
- Polynomial-Space Approximation of No-Signaling Provers
- The complexity of promise problems with applications to public-key cryptography
- On fixed-polynomial size circuit lower bounds for uniform polynomials in the sense of Valiant
- On fixed-polynomial size circuit lower bounds for uniform polynomials in the sense of Valiant
Cited in
(only showing first 100 items - show all)- Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification
- Functional commitment schemes: from polynomial commitments to pairing-based accumulators from simple assumptions
- Private polynomial commitments and applications to MPC
- Verifiable Inner Product Encryption Scheme
- Zero-Knowledge Authenticated Order Queries and Order Statistics on a List
- Dory: efficient, transparent arguments for generalised inner products and polynomial commitments
- A survey of elliptic curves for proof systems
- Proving knowledge of isogenies: a survey
- Functional commitments for all functions, with transparent setup and from SIS
- UC Updatable Databases and Applications
- SnarkPack: practical SNARK aggregation
- SoK: blockchain light clients
- What makes Fiat-Shamir zkSNARKs (updatable SRS) simulation extractable?
- Revisiting Cryptographic Accumulators, Additional Properties and Relations to Other Primitives
- \textsf{Halo Infinite}: proof-carrying data from additive polynomial commitments
- An algebraic framework for universal and updatable SNARKs
- Partial bits exposure attacks on a new commitment scheme based on the Zagier polynomial
- Aggregatable distributed key generation
- Improved constructions of anonymous credentials from structure-preserving signatures on equivalence classes
- Incrementally aggregatable vector commitments and applications to verifiable decentralized storage
- Improved extension protocols for Byzantine broadcast and agreement
- KDM security for the Fujisaki-Okamoto transformations in the QROM
- Trusted computing with addition machines. II
- Constant size ring signature without random oracle
- Boosting verifiable computation on encrypted data
- Transparent SNARKs from DARK compilers
- \(\mathcal{Lunar}\): a toolbox for more efficient universal and updatable zkSNARKs and commit-and-prove extensions
- Nova: recursive zero-knowledge arguments from folding schemes
- Time- and space-efficient arguments from groups of unknown order
- Marlin: preprocessing zkSNARKs with universal and updatable SRS
- Polynomial-Space Approximation of No-Signaling Provers
- Vector commitments and their applications
- Zero-knowledge argument for polynomial evaluation with application to blacklists
- An Efficient and Provably Secure Private Polynomial Evaluation Scheme
- HyperPlonk: Plonk with linear-time prover and high-degree custom gates
- Witness-succinct universally-composable SNARKs
- Logarithmic-size (linkable) threshold ring signatures in the plain model
- Storing and retrieving secrets on a blockchain
- \textsf{Dew}: a transparent constant-sized polynomial commitment scheme
- Polynomial IOPs for linear algebra relations
- \textsf{ECLIPSE}: enhanced compiling method for Pedersen-committed zkSNARK engines
- Vector and functional commitments from lattices
- Spartan: efficient and general-purpose zkSNARKs without trusted setup
- Zero-knowledge for homomorphic key-value commitments with applications to privacy-preserving ledgers
- Structure-preserving signatures on equivalence classes and constant-size anonymous credentials
- Succinct vector, polynomial, and functional commitments from lattices
- Improved threshold signatures, proactive secret sharing, and input certification from LSS isomorphisms
- High-threshold AVSS with optimal communication complexity
- Succinct functional commitment for a large class of arithmetic circuits
- A position-aware Merkle tree for dynamic cloud data integrity verification
- Proofs for inner pairing products and applications
- Linear-map vector commitments and their practical applications
- Decentralized policy-hiding ABE with receiver privacy
- Guaranteed output in \(O(\sqrt{n})\) rounds for round-robin sampling protocols
- Families of SNARK-friendly 2-chains of elliptic curves
- Gemini: elastic SNARKs for diverse environments
- MoniPoly -- an expressive \(q\)-SDH-based anonymous attribute-based credential system
- Additive-homomorphic functional commitments and applications to homomorphic signatures
- \textsf{Bingo}: adaptivity and asynchrony in verifiable secret sharing and distributed key generation
- \textsf{Orbweaver}: succinct linear functional commitments from lattices
- Revisiting cycles of pairing-friendly elliptic curves
- Functional commitments for arbitrary circuits of bounded sizes
- FRIDA: data availability sampling from FRI
- Efficient transparent polynomial commitments for zk-SNARKs
- Threshold encryption with silent setup
- On the impossibility of algebraic vector commitments in pairing-free groups
- Concise Mercurial Subvector Commitments: Definitions and Constructions
- Distributed-prover interactive proofs
- Chainable functional commitments for unbounded-depth circuits
- From polynomial IOP and commitments to non-malleable zkSNARKs
- How to compile polynomial IOP into simulation-extractable SNARKs: a modular approach
- Cuckoo commitments: registration-based encryption and key-value map commitments for large spaces
- Advancing scalability in decentralized storage: a novel approach to proof-of-replication via polynomial evaluation
- Loquat: a SNARK-friendly post-quantum signature based on the Legendre PRF with applications in ring and aggregate signatures
- Brakedown: linear-time and field-agnostic SNARKs for R1CS
- Towards zero knowledge argument for double discrete logarithm with constant cost
- \textsf{Testudo}: linear time prover SNARKs with constant size proofs and square root size universal setup
- Benchmarking the setup of updatable zk-SNARKs
- Folding schemes with selective verification
- PointProofs, revisited
- Cryptoeconomic security for data availability committees
- Proof of necessary work: succinct state verification with fairness guarantees
- Lattice-based SNARKs: publicly verifiable, preprocessing, and recursively composable (extended abstract)
- Lattice-based polynomial commitments: towards asymptotic and concrete efficiency
- Efficient KZG-based univariate sum-check and lookup argument
- Succinct functional commitments for circuits from \(k\)-\textsf{Lin}
- \textsf{Jolt}: SNARKs for virtual machines via lookups
- Constant-size zk-SNARKs in ROM from falsifiable assumptions
- Public-coin, complexity-preserving, succinct arguments of knowledge for NP from collision-resistance
- SPRINT: high-throughput robust distributed Schnorr signatures
- Unlocking the lookup singularity with \textsf{Lasso}
- SLAP: succinct lattice-based polynomial commitments from standard assumptions
- \textsc{Zeromorph}: zero-knowledge multilinear-evaluation proofs from homomorphic univariate commitments
- Lattice-based functional commitments: fast verification and cryptanalysis
- Counting vampires: from univariate sumcheck to updatable ZK-SNARK
- Inner product functional commitments with constant-size public parameters and openings
- Pairings in rank-1 constraint systems
- eSTARK: extending STARKs with arguments
- Lookup arguments: improvements, extensions and applications to zero-knowledge decision trees
- Simulation-extractable KZG polynomial commitments and applications to HyperPlonk
This page was built for publication: Constant-Size Commitments to Polynomials and Their Applications
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3058656)