Zaps and Their Applications

From MaRDI portal
Publication:5432360

DOI10.1137/S0097539703426817zbMath1125.94019OpenAlexW2132951912MaRDI QIDQ5432360

Cynthia Dwork, Moni Naor

Publication date: 3 January 2008

Published in: SIAM Journal on Computing (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1137/s0097539703426817



Related Items

Compact ring signatures from learning with errors, One-message zero knowledge and non-malleable commitments, Certifying trapdoor permutations, revisited, On Non-Black-Box Simulation and the Impossibility of Approximate Obfuscation, The Journey from NP to TFNP Hardness, Three-Round Public-Coin Bounded-Auxiliary-Input Zero-Knowledge Arguments of Knowledge, A note on the Dwork-Naor timed deniable authentication, Separating Computational and Statistical Differential Privacy in the Client-Server Model, A note on perfect correctness by derandomization, Unconditionally anonymous ring and mesh signatures, Versatile and sustainable timed-release encryption and sequential time-lock puzzles (extended abstract), Minimal Assumptions and Round Complexity for Concurrent Zero-Knowledge in the Bare Public-Key Model, Round-optimal multi-party computation with identifiable abort, Non-interactive zero-knowledge proofs with fine-grained security, Toward non-interactive zero-knowledge proofs for NP from LWE, Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems, Fully homomorphic NIZK and NIWI proofs, Explainable arguments, Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation, Transparent batchable time-lock puzzles and applications to Byzantine consensus, NIZKs with an Untrusted CRS: Security in the Face of Parameter Subversion, Collision-resistance from multi-collision-resistance, NIZK from SNARGs, Verifiable relation sharing and multi-verifier zero-knowledge in two rounds: trading NIZKs with honest majority (extended abstract), Logarithmic-size (linkable) threshold ring signatures in the plain model, Round-optimal honest-majority MPC in Minicrypt and with everlasting security (extended abstract), Statistical security in two-party computation revisited, Unconditionally secure NIZK in the fine-grained setting, NIWI and new notions of extraction for algebraic languages, Statistically sender-private OT from LPN and derandomization, Updatable NIZKs from non-interactive zaps, Universal reductions: reductions relative to stateful oracles, More efficient verifiable functional encryption, Towards practical homomorphic time-lock puzzles: applicability and verifiability, On constant-round concurrent non-malleable proof systems, The hunting of the SNARK, Reusable secure computation in the plain model, A note on non-interactive zero-knowledge from CDH, Secure MPC: laziness leads to GOD, Black-box impossibilities of obtaining 2-round weak ZK and strong WI from polynomial hardness, Statistical ZAPs from group-based assumptions, (2+\(f\)(\(n\)))-SAT and its properties., Structure Versus Hardness Through the Obfuscation Lens, Predictable Arguments of Knowledge, On the Exact Round Complexity of Self-composable Two-Party Computation, Lower bounds for non-black-box zero knowledge, Limits of Constructive Security Proofs, Injective trapdoor functions via derandomization: how strong is Rudich's black-box barrier?, Injective trapdoor functions via derandomization: how strong is Rudich's black-box barrier?, Verifiable random functions from non-interactive witness-indistinguishable proofs, Round-optimal secure multi-party computation, A Transform for NIZK Almost as Efficient and General as the Fiat-Shamir Transform Without Programmable Random Oracles, Improved OR-Composition of Sigma-Protocols, Resettably Secure Computation, Compact designated verifier NIZKs from the CDH assumption without pairings, How to extract useful randomness from unreliable sources, Non-interactive zero-knowledge in pairing-free groups from weaker assumptions, Statistical ZAPR arguments from bilinear maps, Statistical ZAP arguments, Statistical Zaps and new oblivious transfer protocols, Non-interactive zero knowledge from sub-exponential DDH, Round-optimal blind signatures in the plain model from classical and quantum standard assumptions, Towards accountability in CRS generation, On the Existence of Extractable One-Way Functions, New techniques for zero-knowledge: leveraging inefficient provers to reduce assumptions, interaction, and trust, Shorter non-interactive zero-knowledge arguments and ZAPs for algebraic languages, A Note on Perfect Correctness by Derandomization, Weak Zero-Knowledge beyond the Black-Box Barrier