Theory of Cryptography
From MaRDI portal
Publication:5898641
Recommendations
- Using fully homomorphic hybrid encryption to minimize non-interative zero-knowledge proofs
- On zero-testable homomorphic encryption and publicly verifiable non-interactive arguments
- Making Sigma-protocols non-interactive without random oracles
- New techniques for noninteractive zero-knowledge
- Non-interactive zero knowledge from sub-exponential DDH
Cited in
(26)- scientific article; zbMATH DE number 176565 (Why is no real title available?)
- Reconciling non-malleability with homomorphic encryption
- Efficient confirmer signatures from the ``signature of a commitment paradigm
- scientific article; zbMATH DE number 6720551 (Why is no real title available?)
- Succinct publicly-certifiable proofs. Or, can a blockchain verify a designated-verifier proof?
- Making Sigma-protocols non-interactive without random oracles
- Compact designated verifier NIZKs from the CDH assumption without pairings
- Zero-knowledge arguments for subverted RSA groups
- On zero-testable homomorphic encryption and publicly verifiable non-interactive arguments
- A transform for NIZK almost as efficient and general as the Fiat-Shamir transform without programmable random oracles
- New constructions of statistical NIZKs: dual-mode DV-NIZKs and more
- Using fully homomorphic hybrid encryption to minimize non-interative zero-knowledge proofs
- \textsc{Ciminion}: symmetric encryption based on Toffoli-gates over large finite fields
- Fully homomorphic NIZK and NIWI proofs
- Non-Interactive Zero-Knowledge Proofs of Non-Membership
- Simplified Submission of Inputs to Protocols
- Optimally sound sigma protocols under DCRA
- Benaloh's dense probabilistic encryption revisited
- Co-sound Zero-Knowledge with Public Keys
- Noninteractive Zero-Knowledge
- Shorter non-interactive zero-knowledge arguments and ZAPs for algebraic languages
- Simultaneous amplification: the case of non-interactive zero-knowledge
- Dual-mode NIZKs: possibility and impossibility results for property transfer
- Round-Optimal Blind Signatures from Waters Signatures
- Multi-theorem preprocessing NIZKs from lattices
- One-shot Fiat-Shamir-based NIZK arguments of composite residuosity and logarithmic-size ring signatures in the standard model
This page was built for publication: Theory of Cryptography
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5898641)