Efficient concurrent zero-knowledge in the auxiliary string model
From MaRDI portal
Publication:3374926
zbMATH Open1082.94539MaRDI QIDQ3374926FDOQ3374926
Authors: Ivan B. Damgård
Publication date: 1 March 2006
Recommendations
Cited In (43)
- Concurrently Non-malleable Black-Box Zero Knowledge in the Bare Public-Key Model
- On the Portability of Generalized Schnorr Proofs
- Improved constructions of anonymous credentials from structure-preserving signatures on equivalence classes
- Secure parameterized pattern matching
- Concurrent knowledge extraction in public-key models
- A transform for NIZK almost as efficient and general as the Fiat-Shamir transform without programmable random oracles
- On the relationship between statistical zero-knowledge and statistical randomized encodings
- On the relationship between statistical zero-knowledge and statistical randomized encodings
- Zero-knowledge arguments for matrix-vector relations and lattice-based group encryption
- SnarkPack: practical SNARK aggregation
- Efficient set operations in the presence of malicious adversaries
- Fiat-Shamir for highly sound protocols is instantiable
- Equivocal Blind Signatures and Adaptive UC-Security
- Fiat-Shamir for highly sound protocols is instantiable
- Compact E-Cash and Simulatable VRFs Revisited
- Structure-preserving signatures on equivalence classes and constant-size anonymous credentials
- A note on universal composable zero-knowledge in the common reference string model
- Anonymous authentication with optional shared anonymity revocation and linkability
- Rational modular encoding in the DCR setting: non-interactive range proofs and Paillier-based Naor-Yung in the standard model
- Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions
- Lattice-Based Group Encryption with Full Dynamicity and Message Filtering Policy
- SIDH proof of knowledge
- A verifiable secret shuffle of homomorphic encryptions
- Hybrid commitments and their applications to zero-knowledge proof systems
- Two-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from lattices
- Everlasting UC commitments from fully malicious PUFs
- Efficient oblivious transfer from lossy threshold homomorphic encryption
- Lattice-based e-cash, revisited
- Dynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential Systems
- Designated confirmer signatures with unified verification
- One-shot Fiat-Shamir-based NIZK arguments of composite residuosity and logarithmic-size ring signatures in the standard model
- Chopsticks: fork-free two-round multi-signatures from non-interactive assumptions
- Concurrent zero knowledge, revisited
- Group Encryption
- Two-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from lattices
- Non-interactive CCA2-secure threshold cryptosystems: achieving adaptive security in the standard model without pairings
- Dual-mode NIZKs: possibility and impossibility results for property transfer
- Efficient, adaptively secure, and composable oblivious transfer with a single, global CRS
- Improved algebraic MACs and practical keyed-verification anonymous credentials
- New Constructions and Applications of Trapdoor DDH Groups
- Threshold Homomorphic Encryption in the Universally Composable Cryptographic Library
- Always have a backup plan: fully secure synchronous MPC with asynchronous fallback
- Efficient zero-knowledge proof of algebraic and non-algebraic statements with applications to privacy preserving credentials
This page was built for publication: Efficient concurrent zero-knowledge in the auxiliary string model
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3374926)