Perfect Non-interactive Zero Knowledge for NP

From MaRDI portal
Publication:3593105

DOI10.1007/11761679_21zbMath1129.94025OpenAlexW1590713339MaRDI QIDQ3593105

Amit Sahai, Rafail Ostrovsky, Jens Groth

Publication date: 24 September 2007

Published in: Advances in Cryptology - EUROCRYPT 2006 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/11761679_21




Related Items (93)

The Usefulness of Sparsifiable Inputs: How to Avoid Subexponential iOOn Black-Box Extensions of Non-interactive Zero-Knowledge Arguments, and Signatures Directly from Simulation SoundnessCertifying trapdoor permutations, revisitedQA-NIZK Arguments of Same Opening for Bilateral CommitmentsSequential aggregate signatures, multisignatures, and verifiably encrypted signatures without random oraclesGeneric Framework for Attribute-Based Group SignatureSignatures of knowledge for Boolean circuits under standard assumptionsSecure Multiparty RAM Computation in Constant RoundsShort Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple AssumptionsAnother look at extraction and randomization of Groth's zk-SNARKReport and trace ring signaturesSubversion-resistant quasi-adaptive NIZK and applications to modular zk-SNARKsDual-mode NIZKs: possibility and impossibility results for property transferOn black-box extension of a non-interactive zero-knowledge proof system for secret equalityAn improved affine equivalence algorithm for random permutationsUnprovable security of perfect NIZK and non-interactive non-malleable commitmentsFully leakage-resilient signaturesConstant-Round Leakage-Resilient Zero-Knowledge Argument for NP from the Knowledge-of-Exponent AssumptionNon-interactive provably secure attestations for arbitrary RSA prime generation algorithmsCryptographic algorithms for privacy-preserving online applicationsSuper-Perfect Zero-Knowledge ProofsExplainable argumentsWitness-succinct universally-composable SNARKsMultiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscationSelf-bilinear map on unknown order groups from indistinguishability obfuscation and its applicationsNIZKs with an Untrusted CRS: Security in the Face of Parameter SubversionBatch arguments for \textsf{NP} and more from standard bilinear group assumptionsMultimodal private signaturesResumable zero-knowledge for circuits from symmetric key primitivesAnonymous yet Traceable Strong Designated Verifier SignatureDAG-\( \Sigma \): a DAG-based sigma protocol for relations in CNFTriply adaptive UC NIZKMultikey Fully Homomorphic Encryption and ApplicationsImproving the efficiency of report and trace ring signaturesZero-knowledge succinct non-interactive arguments of knowledge based on sets of polynomialsCRS-updatable asymmetric quasi-adaptive NIZK argumentsUniversal ring signatures in the standard modelSecurity-preserving distributed samplers: how to generate any CRS in one round without random oraclesNon-interactive zero-knowledge from non-interactive batch argumentsCorrelation intractability and SNARGs from sub-exponential DDHOn the impossibility of algebraic NIZK in pairing-free groupsA note on non-interactive zero-knowledge from CDHEfficient traceable signatures in the standard modelFinding composite order ordinary elliptic curves using the Cocks-Pinch methodNon-interactive composition of sigma-protocols via Share-then-HashStatistical ZAPs from group-based assumptionsFully-succinct publicly verifiable delegation from constant-size assumptionsTwo-round maliciously secure computation with super-polynomial simulationReceiver selective opening security for identity-based encryption in the multi-challenge settingLaconic private set intersection and applicationsAdaptively secure non-interactive CCA-secure threshold cryptosystems: generic framework and constructionsUnnamed ItemSimplified Submission of Inputs to ProtocolsNew Communication-Efficient Oblivious Transfer Protocols Based on PairingsRevocable Attribute-Based Signatures with Adaptive Security in the Standard ModelIdentity-based quotable ring signatureBetter Two-Round Adaptive Multi-party ComputationFunctional Encryption: Deterministic to Randomized Functions from Simple AssumptionsPerfect Non-interactive Zero Knowledge for NPCompact Group Signatures Without Random OraclesSequential Aggregate Signatures and Multisignatures Without Random OraclesHomomorphic Encryption and Signatures from Vector DecompositionHow to Achieve Perfect Simulation and A Complete Problem for Non-interactive Perfect Zero-KnowledgeEquivocal Blind Signatures and Adaptive UC-SecurityMulti-theorem preprocessing NIZKs from latticesFully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval modelSimulation-based receiver selective opening CCA secure PKE from standard computational assumptionsA Transform for NIZK Almost as Efficient and General as the Fiat-Shamir Transform Without Programmable Random OraclesImproved OR-Composition of Sigma-ProtocolsHow to achieve perfect simulation and a complete problem for non-interactive perfect zero-knowledgeNon-interactive Confirmer SignaturesSub-linear Size Traceable Ring Signatures without Random OraclesA Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext AttacksCandidate Indistinguishability Obfuscation and Functional Encryption for All CircuitsGeneralized Hardness Assumption for Self-bilinear Map with Auxiliary InformationNew constructions of statistical NIZKs: dual-mode DV-NIZKs and moreNon-interactive zero-knowledge in pairing-free groups from weaker assumptionsStatistical ZAPR arguments from bilinear mapsStatistical Zaps and new oblivious transfer protocolsNon-interactive zero knowledge from sub-exponential DDHBifurcated signatures: folding the accountability vs. anonymity dilemma into a single private signing schemeCo-sound Zero-Knowledge with Public KeysNew Techniques for Non-interactive Shuffle and Range ArgumentsSecurity of Verifiably Encrypted Signatures and a Construction without Random OraclesProofs on Encrypted Values in Bilinear Groups and an Application to Anonymity of SignaturesEfficient Traceable Signatures in the Standard ModelTwo-party adaptor signatures from identification schemesSingle-to-multi-theorem transformations for non-interactive statistical zero-knowledgePublic Verifiability from Pairings in Secret Sharing SchemesUsing abelian varieties to improve pairing-based cryptographyEfficiency Preserving Transformations for Concurrent Non-malleable Zero KnowledgeThreshold Homomorphic Encryption in the Universally Composable Cryptographic LibraryTowards witness encryption without multilinear maps



Cites Work


This page was built for publication: Perfect Non-interactive Zero Knowledge for NP