We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 21-40 of 10,000 results
  1. Zero knowledge proof and ZK-SNARK for private blockchains

    Comprehensive adoption of distributed ledger technology and blockchain in enterprises might disrupt financial and other sectors. At the same time,...

    Anatoly Konkin, Sergey Zapechnikov in Journal of Computer Virology and Hacking Techniques
    Article 09 March 2023
  2. A Note on Non-interactive Zero-Knowledge from CDH

    We build non-interactive zero-knowledge (NIZK) and ZAP arguments for all...
    Geoffroy Couteau, Abhishek Jain, ... Willy Quach in Advances in Cryptology – CRYPTO 2023
    Conference paper 2023
  3. Weak Zero-Knowledge via the Goldreich-Levin Theorem

    Obtaining three round zero-knowledge from standard cryptographic assumptions has remained a challenging open problem. Meanwhile, there has been...
    Dakshita Khurana, Giulio Malavolta, Kabir Tomer in Advances in Cryptology – ASIACRYPT 2023
    Conference paper 2023
  4. Efficient Non-interactive Zero-Knowledge Proof for Graph 3-Coloring Problem

    Zero-knowledge proof (ZKP) has a crucial role in the construction of cryptographic protocols and privacy protection. One of the core research...
    Haitao Zhan, Dongyang Bai, ... Mingwu Zhang in Frontiers in Cyber Security
    Conference paper 2024
  5. On Publicly-Accountable Zero-Knowledge and Small Shuffle Arguments

    Constructing interactive zero-knowledge arguments from simple assumptions with small communication complexity and good computational efficiency is an...
    Nils Fleischhacker, Mark Simkin in Public-Key Cryptography – PKC 2021
    Conference paper 2021
  6. Steganography-Free Zero-Knowledge

    We revisit the well-studied problem of preventing steganographic communication in multi-party communications. While this is known to be a provably...
    Behzad Abdolmaleki, Nils Fleischhacker, ... Giulio Malavolta in Theory of Cryptography
    Conference paper 2022
  7. Guest editorial: Special issue on Mathematics of Zero-Knowledge

    Steven Galbraith, Rosario Gennaro, ... Ron Steinfeld in Designs, Codes and Cryptography
    Article 07 July 2023
  8. Zero-Knowledge Proofs for SIDH Variants with Masked Degree or Torsion

    The polynomial attacks on SIDH by Castryck, Decru, Maino, Martindale and Robert have shown that, while the general isogeny problem is still...
    Conference paper 2024
  9. Lattice-based zero-knowledge arguments for additive and multiplicative relations

    In this work, we propose new lattice-based protocols which are used to prove additive and multiplicative relations of committed integers. We...

    Veronika Kuchta, Amin Sakzad, ... Joseph K. Liu in Designs, Codes and Cryptography
    Article 02 March 2021
  10. Oblivious Transfer from Zero-Knowledge Proofs

    We provide a generic construction to turn any classical Zero-Knowledge (ZK) protocol into a composable (quantum) oblivious transfer (OT) protocol,...
    Léo Colisson, Garazi Muguruza, Florian Speelman in Advances in Cryptology – ASIACRYPT 2023
    Conference paper 2023
  11. Privacy-Preserving Educational Credentials Management Based on Decentralized Identity and Zero-Knowledge Proof

    Educational credentials are an important part of the education ecosystem. However, these credentials often exist in the form of traditional paper...
    Tianmin **ong, Zhao Zhang, Cheqin **g in Computer Science and Education. Computer Science and Technology
    Conference paper 2024
  12. State of the Art in Zero-Knowledge Machine Learning: A Comprehensive Survey

    In recent years, the field of Machine Learning (ML) has witnessed significant expansion, with its applications spanning various domains such as...
    Aneesh Sathe, Varun Saxena, ... S. Sandosh in Advancements in Smart Computing and Information Security
    Conference paper 2024
  13. Certified Everlasting Zero-Knowledge Proof for QMA

    In known constructions of classical zero-knowledge protocols for $${\textbf...
    Taiga Hiroka, Tomoyuki Morimae, ... Takashi Yamakawa in Advances in Cryptology – CRYPTO 2022
    Conference paper 2022
  14. Seeing both sides: context-aware heterogeneous graph matching networks for extracting-related arguments

    Our research focuses on extracting exchanged views from dialogical documents through argument pair extraction (APE). The objective of this process is...

    Tiezheng Mao, Osamu Yoshie, ... Weixin Mao in Neural Computing and Applications
    Article Open access 18 December 2023
  15. Horst Meets Fluid-SPN: Griffin for Zero-Knowledge Applications

    Zero-knowledge (ZK) applications form a large group of use cases in modern cryptography, and recently gained in popularity due to novel proof...
    Lorenzo Grassi, Yonglin Hao, ... Qingju Wang in Advances in Cryptology – CRYPTO 2023
    Conference paper 2023
  16. Mining legal arguments in court decisions

    Identifying, classifying, and analyzing arguments in legal discourse has been a prominent area of research since the inception of the argument mining...

    Ivan Habernal, Daniel Faber, ... Christoph Burchard in Artificial Intelligence and Law
    Article Open access 23 June 2023
  17. Ligero: lightweight sublinear arguments without a trusted setup

    Scott Ames, Carmit Hazay, ... Muthuramakrishnan Venkitasubramaniam in Designs, Codes and Cryptography
    Article 13 July 2023
  18. Updatable Trapdoor SPHFs: Modular Construction of Updatable Zero-Knowledge Arguments and More

    Recently, motivated by its increased use in real-world applications, there has been a growing interest on the reduction of trust in the generation of...
    Behzad Abdolmaleki, Daniel Slamanig in Information Security and Privacy
    Conference paper 2021
  19. Zero-History Confidential Chains with Zero-Knowledge Contracts: A New Normal for Decentralized Ledgers?

    Popular public blockchains face many problems due to their catastrophic blockchain sizes and verification time, e.g., lack of peer scalability, high...
    Jayamine Alupotha, Xavier Boyen, Matthew McKague in Computer Security – ESORICS 2022
    Conference paper 2022
Did you find what you were looking for? Share feedback.