Resettable zero-knowledge (extended abstract)

From MaRDI portal
Publication:3191990

DOI10.1145/335305.335334zbMath1296.94093OpenAlexW2074929468MaRDI QIDQ3191990

Shafi Goldwasser, Oded Goldreich, Ran Canetti, Silvio Micali

Publication date: 26 September 2014

Published in: Proceedings of the thirty-second annual ACM symposium on Theory of computing (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1145/335305.335334



Related Items

Threshold Schnorr with stateless deterministic signing from standard assumptions, Concurrent knowledge extraction in public-key models, On QA-NIZK in the BPK Model, On Non-Black-Box Simulation and the Impossibility of Approximate Obfuscation, Pattern matching on encrypted streams, Separating Computational and Statistical Differential Privacy in the Client-Server Model, Unprovable security of perfect NIZK and non-interactive non-malleable commitments, Minimal Assumptions and Round Complexity for Concurrent Zero-Knowledge in the Bare Public-Key Model, Verifiably-Extractable OWFs and Their Applications to Subversion Zero-Knowledge, On the impossibility of cryptography with tamperable randomness, NIZKs with an Untrusted CRS: Security in the Face of Parameter Subversion, Indistinguishable Proofs of Work or Knowledge, Non-black-box simulation in the fully concurrent setting, revisited, Smooth zero-knowledge hash functions, Individual simulations, Constant-Round Concurrent Non-malleable Zero Knowledge in the Bare Public-Key Model, Post-quantum resettably-sound zero knowledge, Leakproof secret sharing protocols with applications to group identification scheme, Non-interactive secure computation from one-way functions, Impossibility results for universal composability in public-key models and with fixed inputs, Concurrent zero knowledge, revisited, (2+\(f\)(\(n\)))-SAT and its properties., Random walks and concurrent zero-knowledge, Efficient non-malleable commitment schemes, Lower bounds for non-black-box zero knowledge, Efficient non-malleable commitment schemes, On expected probabilistic polynomial-time adversaries: a suggestion for restricted definitions and their benefits, Unclonable Group Identification, Online-Untransferable Signatures, Improved OR-Composition of Sigma-Protocols, Non-Black-Box Simulation from One-Way Functions and Applications to Resettable Security, On subversion-resistant SNARKs, Resettably Secure Computation, Minicrypt primitives with algebraic structure and applications, Non-interactive distributional indistinguishability (NIDI) and non-malleable commitments, Handling expected polynomial-time strategies in simulation-based security proofs, Co-sound Zero-Knowledge with Public Keys, Adaptive Hardness and Composable Security in the Plain Model from Standard Assumptions, Concurrently Non-malleable Black-Box Zero Knowledge in the Bare Public-Key Model, Concurrent Non-Malleable Commitments (and More) in 3 Rounds, On the Necessary and Sufficient Assumptions for UC Computation, Two Is a Crowd? A Black-Box Separation of One-Wayness and Security under Correlated Inputs, Founding Cryptography on Tamper-Proof Hardware Tokens, Efficiency Preserving Transformations for Concurrent Non-malleable Zero Knowledge, Fiat-Shamir for repeated squaring with applications to PPAD-hardness and VDFs, Pseudorandom Functions: Three Decades Later, Weak Zero-Knowledge beyond the Black-Box Barrier