New Techniques for Noninteractive Zero-Knowledge

From MaRDI portal
Publication:5395682

DOI10.1145/2220357.2220358zbMath1281.68102OpenAlexW2013686252MaRDI QIDQ5395682

Rafail Ostrovsky, Jens Groth, Amit Sahai

Publication date: 17 February 2014

Published in: Journal of the ACM (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1145/2220357.2220358




Related Items (51)

On the round complexity of randomized Byzantine agreementOne-message zero knowledge and non-malleable commitmentsCertifying trapdoor permutations, revisitedSeparating Computational and Statistical Differential Privacy in the Client-Server ModelAdaptively secure threshold symmetric-key encryptionDual-mode NIZKs: possibility and impossibility results for property transferShort, invertible elements in partially splitting cyclotomic rings and applications to lattice-based zero-knowledge proofsGuaranteed output in \(O(\sqrt{n})\) rounds for round-robin sampling protocolsCOA-secure obfuscation and applicationsNon-interactive zero-knowledge proofs with fine-grained securityToward non-interactive zero-knowledge proofs for NP from LWERational Modular Encoding in the DCR Setting: Non-interactive Range Proofs and Paillier-Based Naor-Yung in the Standard ModelWitness-succinct universally-composable SNARKsA Shuffle Argument Secure in the Generic ModelPAPR: publicly auditable privacy revocation for anonymous credentialsFine-grained verifier NIZK and its applicationsNIZK from SNARGsVerifiable relation sharing and multi-verifier zero-knowledge in two rounds: trading NIZKs with honest majority (extended abstract)Round-optimal honest-majority MPC in Minicrypt and with everlasting security (extended abstract)Unconditionally secure NIZK in the fine-grained settingTriply adaptive UC NIZKClassically verifiable NIZK for QMA with preprocessingNIWI and new notions of extraction for algebraic languagesOn non-uniform security for black-box non-interactive CCA commitmentsGeneric constructions of master-key KDM secure attribute-based encryptionMultikey Fully Homomorphic Encryption and ApplicationsUsing fully homomorphic hybrid encryption to minimize non-interative zero-knowledge proofsNon-interactive zero-knowledge from non-interactive batch argumentsCommunication complexity of Byzantine agreement, revisitedLaBRADOR: compact proofs for R1CS from Module-SISTowards efficiency-preserving round compression in MPC. Do fewer rounds mean more computation?Simulation-sound arguments for LWE and applications to KDM-CCA2 securityBlack-box impossibilities of obtaining 2-round weak ZK and strong WI from polynomial hardnessPredicate signatures from pair encodings via dual system proof techniqueVerifiable random functions from non-interactive witness-indistinguishable proofsOrder-Revealing Encryption and the Hardness of Private LearningCryptography in the multi-string modelCompact designated verifier NIZKs from the CDH assumption without pairingsCompact NIZKs from standard assumptions on bilinear mapsNew constructions of statistical NIZKs: dual-mode DV-NIZKs and moreStatistical ZAPR arguments from bilinear mapsSublinear-round Byzantine agreement under corrupt majorityAdaptively secure MPC with sublinear communication complexityBlack-box non-interactive non-malleable commitmentsNon-interactive distributional indistinguishability (NIDI) and non-malleable commitmentsSingle-to-multi-theorem transformations for non-interactive statistical zero-knowledgeOptimally Sound Sigma Protocols Under DCRANew techniques for zero-knowledge: leveraging inefficient provers to reduce assumptions, interaction, and trustNIZK from LPN and trapdoor hash via correlation intractability for approximable relationsShorter non-interactive zero-knowledge arguments and ZAPs for algebraic languagesWeak Zero-Knowledge beyond the Black-Box Barrier




This page was built for publication: New Techniques for Noninteractive Zero-Knowledge