Adaptive security in SNARGs via iO and lossy functions
From MaRDI portal
Publication:6660293
Recommendations
Cites work
- Adaptive security in SNARGs via iO and lossy functions
- Adaptively sound zero-knowledge SNARKs for UP
- Automata, Languages and Programming
- Batch arguments for \textsf{NP} and more from standard bilinear group assumptions
- Compact selective opening security from LWE
- Constrained pseudorandom functions and their applications
- From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again
- Functional signatures and pseudorandom functions
- Generating shorter bases for hard random lattices
- How to use indistinguishability obfuscation
- Impossibilities in succinct arguments: black-box extraction and more
- Lattice-based SNARKs: publicly verifiable, preprocessing, and recursively composable (extended abstract)
- Lattice-based succinct arguments from vanishing polynomials (extended abstract)
- Lossy trapdoor functions and their applications
- Obfuscation of probabilistic circuits and applications
- On ELFs, deterministic encryption, and correlated-input security
- On constructing one-way permutations from indistinguishability obfuscation
- On the Cryptographic Applications of Random Functions (Extended Abstract)
- Quadratic span programs and succinct NIZKs without PCPs
- Secure two-party computation with low communication
- Security-preserving distributed samplers: how to generate any CRS in one round without random oracles
- Separating succinct non-interactive arguments from all falsifiable assumptions
- Short pairing-based non-interactive zero-knowledge arguments
- Structure vs. hardness through the obfuscation lens
- Succinct non-interactive arguments via linear interactive proofs
- Succinct non-interactive zero knowledge arguments from span programs and linear error-correcting codes
- The Magic of ELFs
- The Usefulness of Sparsifiable Inputs: How to Avoid Subexponential iO
- The hunting of the SNARK
- Theory of Cryptography
- Trapdoor hash functions and their applications
Cited in
(2)
This page was built for publication: Adaptive security in SNARGs via iO and lossy functions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6660293)