Efficient Non-interactive Proof Systems for Bilinear Groups

From MaRDI portal
Publication:5458605

DOI10.1007/978-3-540-78967-3_24zbMath1149.94320OpenAlexW2141395382MaRDI QIDQ5458605

Jens Groth, Amit Sahai

Publication date: 15 April 2008

Published in: Advances in Cryptology – EUROCRYPT 2008 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-540-78967-3_24




Related Items

Verifiable Inner Product Encryption SchemeHierarchical Identity-Based Encryption with Tight Multi-challenge SecurityBringing Order to Chaos: The Case of Collision-Resistant Chameleon-HashesQA-NIZK Arguments of Same Opening for Bilateral CommitmentsSignatures of Knowledge for Boolean Circuits Under Standard AssumptionsImplicit Zero-Knowledge Arguments and Applications to the Malicious SettingEfficient Zero-Knowledge Proofs of Non-algebraic Statements with Sublinear Amortized CostPractical Round-Optimal Blind Signatures in the Standard ModelStructure-Preserving Signatures from Standard Assumptions, RevisitedShort Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple AssumptionsPublic-Key Encryption with Simulation-Based Selective-Opening Security and Compact CiphertextsDynamic Threshold Public-Key Encryption with Decryption Consistency from Static AssumptionsGeneric Transformation to Strongly Existentially Unforgeable Signature Schemes with Continuous Leakage ResiliencyConstant Size Ring Signature Without Random OracleA New Public Remote Integrity Checking Scheme with User PrivacyEfficient Non-interactive Range ProofRational Modular Encoding in the DCR Setting: Non-interactive Range Proofs and Paillier-Based Naor-Yung in the Standard ModelCompressed $$\varSigma $$-Protocols for Bilinear Group Arithmetic Circuits and Application to Logarithmic Transparent Threshold SignaturesA survey of elliptic curves for proof systemsExtendable threshold ring signatures with enhanced anonymityStructure-Preserving Smooth Projective HashingSignature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice AssumptionsNIZKs with an Untrusted CRS: Security in the Face of Parameter SubversionPAPR: publicly auditable privacy revocation for anonymous credentialsEnd-to-end secure messaging with traceability only for illegal contentChopsticks: fork-free two-round multi-signatures from non-interactive assumptionsNon-interactive blind signatures for random messagesDeniable authentication when signing keys leakA generic transform from multi-round interactive proof to NIZKBatch arguments for \textsf{NP} and more from standard bilinear group assumptionsMultimodal private signaturesRelaxed Lattice-Based Signatures with Short Zero-Knowledge ProofsStrongly Unforgeable Signature Resilient to Polynomially Hard-to-Invert Leakage Under Standard AssumptionsA Revocable Group Signature Scheme with Scalability from Simple Assumptions and Its ImplementationFuzzy authenticated key exchange with tight securityWitness encryption from smooth projective hashing systemTraceable constant-size multi-authority credentialsEfficient Public-Key Cryptography with Bounded Leakage and Tamper ResilienceTraceable constant-size multi-authority credentialsDAG-\( \Sigma \): a DAG-based sigma protocol for relations in CNFUnconditionally secure NIZK in the fine-grained settingTrapdoor sanitizable and redactable signatures with unlinkability, invisibility and strong context-hidingAttribute-based signatures for range of inner product and its applicationsNIWI and new notions of extraction for algebraic languagesSNACKs: leveraging proofs of sequential work for blockchain light clientsGeneric constructions of master-key KDM secure attribute-based encryptionProofs for inner pairing products and applicationsEfficient NIZKs for algebraic setsHierarchical Attribute-Based SignaturesCRS-updatable asymmetric quasi-adaptive NIZK argumentsPractical non-malleable codes from symmetric-key primitives in 2-split-state modelEndemic oblivious transfer via random oracles, revisitedOn the impossibility of algebraic NIZK in pairing-free groupsIdentity-based encryption with (almost) tight security in the multi-instance, multi-ciphertext settingIndistinguishability obfuscationConstructions Secure Against Receiver Selective Opening and Chosen Ciphertext AttacksAnonymous Proxy SignaturesFully Anonymous Group Signatures Without Random OraclesA Signature Scheme with Efficient Proof of ValidityEfficient and Secure Generalized Pattern Matching via Fast Fourier TransformAchieving Optimal Anonymity in Transferable E-Cash with a JudgeRevocable Attribute-Based Signatures with Adaptive Security in the Standard ModelEfficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRSEfficient UC-Secure Authenticated Key-Exchange for Algebraic LanguagesTagged One-Time Signatures: Tight Security and Optimal Tag SizeEfficient Completely Context-Hiding Quotable and Linearly Homomorphic SignaturesVerifiable Elections That Scale for FreeAccess Control Encryption for Equality, Comparison, and MoreImproved Structure Preserving Signatures Under Standard Bilinear AssumptionsCut Down the Tree to Achieve Constant Complexity in Divisible E-cashStructure-Preserving Chosen-Ciphertext Security with Shorter Verifiable CiphertextsProjective Arithmetic Functional Encryption and Indistinguishability Obfuscation from Degree-5 Multilinear MapsEfficient Confirmer Signatures from the “Signature of a Commitment” ParadigmZero-knowledge proofs for set membership: efficient, succinct, modularFine-grained secure attribute-based encryptionAmbiguous Optimistic Fair ExchangeUniversally Composable Adaptive Oblivious TransferContinuously non-malleable codes with split-state refreshAn Analysis of Affine Coordinates for Pairing ComputationMulti-theorem preprocessing NIZKs from latticesSimulation-based receiver selective opening CCA secure PKE from standard computational assumptionsNon-interactive Confirmer SignaturesAttribute-Based SignaturesSub-linear Size Traceable Ring Signatures without Random OraclesA Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext AttacksAnonymous Consecutive Delegation of Signing Rights: Unifying Group and Proxy SignaturesCompact E-Cash and Simulatable VRFs RevisitedProofs on Encrypted Values in Bilinear Groups and an Application to Anonymity of SignaturesIdentity Based Group Signatures from Hierarchical Identity-Based EncryptionEfficient Traceable Signatures in the Standard ModelUniversally Composable Adaptive Priced Oblivious TransferBlock-Wise P-Signatures and Non-interactive Anonymous Credentials with Efficient AttributesSanitizable Signatures RevisitedOptimally Sound Sigma Protocols Under DCRAAdequate Elliptic Curves for Computing the Product of n PairingsShort Attribute-Based Signatures for Threshold PredicatesPlaintext-Checkable EncryptionStructure-preserving signatures and commitments to group elementsSignature schemes secure against hard-to-invert leakageTwo-round MPC: information-theoretic and black-boxCertifying trapdoor permutations, revisitedTightly secure signatures and public-key encryptionWitness authenticating NIZKs and applicationsFine-grained secure attribute-based encryptionPolicy-based signature scheme from latticesBorn and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short sharesFiat-Shamir for highly sound protocols is instantiableSignatures of knowledge for Boolean circuits under standard assumptionsZero-knowledge proofs for set membership: efficient, succinct, modularGeneric plaintext equality and inequality proofsSomewhere statistically binding commitment schemes with applicationsAnother look at extraction and randomization of Groth's zk-SNARKSelectively linkable group signatures -- stronger security and preserved verifiabilitySubversion-resistant quasi-adaptive NIZK and applications to modular zk-SNARKsSkipping the \(q\) in group signaturesOn black-box extension of a non-interactive zero-knowledge proof system for secret equalityDynamic universal accumulator with batch update over bilinear groupsSubversion-resilient enhanced privacy IDShort, invertible elements in partially splitting cyclotomic rings and applications to lattice-based zero-knowledge proofsThe wonderful world of global random oraclesFully leakage-resilient signaturesLogarithmic-size ring signatures with tight security from the DDH assumptionEfficient chameleon hash functions in the enhanced collision resistant modelNon-interactive zero-knowledge proofs with fine-grained securityToward non-interactive zero-knowledge proofs for NP from LWEEfficient and secure attribute-based signature for monotone predicatesPrivacy-enhanced remote data integrity checking with updatable timestampHardware security without secure hardware: how to decrypt with a password and a serverRound-optimal password-based authenticated key exchangeTightly CCA-secure identity-based encryption with ciphertext pseudorandomnessGeneralizing Efficient Multiparty ComputationLinearly homomorphic structure-preserving signatures and their applicationsKey-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledgeMultilinear maps from obfuscationSelf-bilinear map on unknown order groups from indistinguishability obfuscation and its applicationsQANIZK for adversary-dependent languages and their applicationsZero-Knowledge Arguments for Matrix-Vector Relations and Lattice-Based Group EncryptionEfficient KDM-CCA Secure Public-Key Encryption for Polynomial FunctionsShorter identity-based encryption via asymmetric pairingsStructure-preserving signatures on equivalence classes and constant-size anonymous credentialsUsing fully homomorphic hybrid encryption to minimize non-interative zero-knowledge proofsShorter quasi-adaptive NIZK proofs for linear subspacesEfficient traceable signatures in the standard modelFinding composite order ordinary elliptic curves using the Cocks-Pinch methodComplexity theory. Abstracts from the workshop held November 14--20, 2021 (hybrid meeting)Statistical ZAPs from group-based assumptionsFully-succinct publicly verifiable delegation from constant-size assumptionsTightly CCA-secure encryption scheme in a multi-user setting with corruptionsLaconic private set intersection and applicationsTowards tight adaptive security of non-interactive key exchangePolicy-compliant signaturesA CCA-full-anonymous group signature with verifiable controllable linkability in the standard modelAdaptively secure non-interactive CCA-secure threshold cryptosystems: generic framework and constructionsContinuously non-malleable codes in the split-state modelZero-knowledge arguments for matrix-vector relations and lattice-based group encryptionOn the tightness of forward-secure signature reductionsAmbiguous optimistic fair exchange: definition and constructionsOffline witness encryption with semi-adaptive securityTightly secure ring signatures in the standard modelPublic key encryption with keyword search secure against keyword guessing attacks without random oracleAll-but-many encryptionHow to protect privacy in optimistic fair exchange of digital signaturesPredicate signatures from pair encodings via dual system proof techniqueFully secure functional encryption with a large class of relations from the decisional linear assumptionNon-Interactive Zero-Knowledge Proofs of Non-MembershipConverting pairing-based cryptosystems from composite to prime order setting -- a comparative analysisScalable Divisible E-cashReconfigurable Cryptography: A Flexible Approach to Long-Term SecurityMultilinear Maps from ObfuscationPractical witness encryption for algebraic languages or how to encrypt under Groth-Sahai proofsFully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval modelA Transform for NIZK Almost as Efficient and General as the Fiat-Shamir Transform Without Programmable Random OraclesAccountable authority identity-based broadcast encryption with constant-size private keys and ciphertextsTowards Lightweight Anonymous Entity Authentication for IoT ApplicationsGeneralized Hardness Assumption for Self-bilinear Map with Auxiliary InformationNon-interactive zero-knowledge in pairing-free groups from weaker assumptionsLinearly-homomorphic signatures and scalable mix-netsRound-optimal blind signatures in the plain model from classical and quantum standard assumptionsBifurcated signatures: folding the accountability vs. anonymity dilemma into a single private signing schemeA Lattice-Based Group Signature Scheme with Message-Dependent OpeningOffline Witness EncryptionNon-interactive CCA2-secure threshold cryptosystems: achieving adaptive security in the standard model without pairingsTransferable e-cash: a cleaner model and the first practical instantiationFiat–Shamir for Highly Sound Protocols Is InstantiablePractical Round-Optimal Blind Signatures in the Standard Model from Weaker AssumptionsEfficient Zero-Knowledge Proof of Algebraic and Non-Algebraic Statements with Applications to Privacy Preserving CredentialsStructure-preserving public-key encryption with leakage-resilient CCA securityShort tightly secure signatures for signing a vector of group elements: a new approachAn \(r\)-hiding revocable group signature scheme: group signatures with the property of hiding the number of revoked usersRevocable hierarchical attribute-based signatures from latticesNew techniques for zero-knowledge: leveraging inefficient provers to reduce assumptions, interaction, and trustShorter non-interactive zero-knowledge arguments and ZAPs for algebraic languagesGeneric transformation from broadcast encryption to round-optimal deniable ring authenticationShort identity-based signatures with tight security from latticesOn instantiating the algebraic group model from falsifiable assumptions