Zero-Knowledge Proofs from Secure Multiparty Computation

From MaRDI portal
Publication:3575162

DOI10.1137/080725398zbMath1192.68239OpenAlexW2069535412MaRDI QIDQ3575162

Eyal Kushilevitz, Yuval Ishai, Rafail Ostrovsky, Amit Sahai

Publication date: 7 July 2010

Published in: SIAM Journal on Computing (Search for Journal in Brave)

Full work available at URL: https://semanticscholar.org/paper/9c9dc6e15bedebf021415fa28e1c4571b6ac0083




Related Items (29)

LegRoast: Efficient Post-quantum Signatures from the Legendre PRFAn intermediate secret-guessing attack on hash-based signaturesRound-optimal fully black-box zero-knowledge arguments from one-way permutations3-Message Zero Knowledge Against Human IgnoranceComposable Security in the Tamper-Proof Hardware Model Under Minimal ComplexityZK-PCPs from leakage-resilient secret sharingAsymptotically quasi-optimal cryptographyLigero: lightweight sublinear arguments without a trusted setupZero-knowledge protocols for the subset sum problem from MPC-in-the-head with rejectionFaster sounder succinct arguments and \textsf{IOP}sSuccinct interactive oracle proofs: applications and limitationsUsing fully homomorphic hybrid encryption to minimize non-interative zero-knowledge proofsMR-DSS -- smaller MinRank-based (ring-)signaturesPost-quantum verifiable random function from symmetric primitives in PoS blockchainTowards efficiency-preserving round compression in MPC. Do fewer rounds mean more computation?Zero-Knowledge Proofs of ProximityActively secure garbled circuits with constant communication overhead in the plain modelGroup-Based Secure Computation: Optimizing Rounds, Communication, and ComputationWhat security can we achieve within 4 rounds?Multi-theorem preprocessing NIZKs from latticesTraceable ring signatures: general framework and post-quantum securityQuasi-Linear Size Zero Knowledge from Linear-Algebraic PCPsOn the amortized complexity of zero-knowledge protocolsCompact designated verifier NIZKs from the CDH assumption without pairingsOn the power of secure two-party computationSecure multi-party quantum computation with a dishonest majorityOn the Power of Secure Two-Party ComputationRound-optimal black-box commit-and-prove with succinct communicationComputational Integrity with a Public Random String from Quasi-Linear PCPs




This page was built for publication: Zero-Knowledge Proofs from Secure Multiparty Computation