We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 41-60 of 10,000 results
  1. Orion: Zero Knowledge Proof with Linear Prover Time

    Zero-knowledge proof is a powerful cryptographic primitive that has found various applications in the real world. However, existing schemes with...
    Tiancheng **e, Yupeng Zhang, Dawn Song in Advances in Cryptology – CRYPTO 2022
    Conference paper 2022
  2. Succinct Non-Interactive Arguments via Linear Interactive Proofs

    Succinct non-interactive arguments (SNARGs) enable verifying NP statements with lower complexity than required for classical NP verification....

    Nir Bitansky, Alessandro Chiesa, ... Omer Paneth in Journal of Cryptology
    Article Open access 02 May 2022
  3. Overview of Zero-Knowledge Proof and Its Applications in Blockchain

    The rapid development of blockchain technology applications and the increased demand for data security has greatly driven the research on privacy...
    Yu Zhou, Zeming Wei, ... Hua Tang in Blockchain Technology and Application
    Conference paper 2022
  4. Zero Knowledge Protocols and Signatures from the Restricted Syndrome Decoding Problem

    The Restricted Syndrome Decoding Problem (R-SDP) cor- responds to the Syndrome Decoding Problem (SDP) with the additional constraint that all entries...
    Marco Baldi, Sebastian Bitzer, ... Violetta Weger in Public-Key Cryptography – PKC 2024
    Conference paper 2024
  5. (Commit-and-Prove) Predictable Arguments with Privacy

    Predictable arguments introduced by Faonio, Nielsen and Venturi [14] are private-coin argument systems where the answer of the prover can be...
    Hamidreza Khoshakhlagh in Applied Cryptography and Network Security
    Conference paper 2022
  6. A New Approach to Efficient Non-Malleable Zero-Knowledge

    Non-malleable zero-knowledge, originally introduced in the context of man-in-the-middle attacks, serves as an important building block to protect...
    Allen Kim, **ao Liang, Omkant Pandey in Advances in Cryptology – CRYPTO 2022
    Conference paper 2022
  7. Zero-Knowledge Protocols for the Subset Sum Problem from MPC-in-the-Head with Rejection

    We propose (honest verifier) zero-knowledge arguments for the modular subset sum problem. Previous combinatorial approaches, notably one due to...
    Thibauld Feneuil, Jules Maire, ... Damien Vergnaud in Advances in Cryptology – ASIACRYPT 2022
    Conference paper 2022
  8. Zero-Knowledge for Homomorphic Key-Value Commitments with Applications to Privacy-Preserving Ledgers

    Commitments to key-value maps (or, authenticated dictionaries) are an important building block in cryptographic applications, including...
    Matteo Campanelli, Felix Engelmann, Claudio Orlandi in Security and Cryptography for Networks
    Conference paper 2022
  9. Distilling Constraints in Zero-Knowledge Protocols

    The most widely used Zero-Knowledge (ZK) protocols require provers to prove they know a solution to a computational problem expressed as a Rank-1...
    Elvira Albert, Marta Bellés-Muñoz, ... Albert Rubio in Computer Aided Verification
    Conference paper Open access 2022
  10. ZK-for-Z2K: MPC-in-the-Head Zero-Knowledge Proofs for  \(\mathbb {Z}_{2^k}\)

    In this work, we extend the MPC-in-the-Head framework, used in recent efficient zero-knowledge protocols, to work over the ring...
    Lennart Braun, Cyprien Delpech de Saint Guilhem, ... Titouan Tanguy in Cryptography and Coding
    Conference paper 2024
  11. Short-lived Zero-Knowledge Proofs and Signatures

    We introduce the short-lived proof, a non-interactive proof of knowledge with a novel feature: after a specified period of time, the proof is no...
    Arasu Arun, Joseph Bonneau, Jeremy Clark in Advances in Cryptology – ASIACRYPT 2022
    Conference paper 2022
  12. Explainable Arguments

    We introduce an intriguing new type of argument systems with the additional property of being explainable. Intuitively by explainable, we mean that...
    Lucjan Hanzlik, Kamil Kluczniak in Financial Cryptography and Data Security
    Conference paper 2022
  13. CRS-Updatable Asymmetric Quasi-Adaptive NIZK Arguments

    A critical aspect for the practical use of non-interactive zero-knowledge (NIZK) arguments in the common reference string (CRS) model is the demand...
    Behzad Abdolmaleki, Daniel Slamanig in Progress in Cryptology – INDOCRYPT 2022
    Conference paper 2022
  14. Polynomial IOPs for Memory Consistency Checks in Zero-Knowledge Virtual Machines

    Zero-Knowledge Virtual Machines (ZKVMs) have gained traction in recent years due to their potential applications in a variety of areas, particularly...
    Yuncong Zhang, Shi-Feng Sun, ... Dawu Gu in Advances in Cryptology – ASIACRYPT 2023
    Conference paper 2023
  15. Zero-Knowledge IOPs with Linear-Time Prover and Polylogarithmic-Time Verifier

    Interactive oracle proofs (IOPs) are a multi-round generalization of probabilistically checkable proofs that play a fundamental role in the...
    Jonathan Bootle, Alessandro Chiesa, Siqi Liu in Advances in Cryptology – EUROCRYPT 2022
    Conference paper 2022
  16. Your Reputation’s Safe with Me: Framing-Free Distributed Zero-Knowledge Proofs

    Distributed Zero-Knowledge (dZK) proofs, recently introduced by Boneh et al. (CRYPTO‘19), allow a prover...
    Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, Mor Weiss in Theory of Cryptography
    Conference paper 2023
  17. Bulletproofs++: Next Generation Confidential Transactions via Reciprocal Set Membership Arguments

    Zero-knowledge proofs are a cryptographic cornerstone of privacy-preserving technologies such as “Confidential Transactions” (CT), which aims at...
    Liam Eagen, Sanket Kanjalkar, ... Jonas Nick in Advances in Cryptology – EUROCRYPT 2024
    Conference paper 2024
  18. Lattice-Based Succinct Arguments from Vanishing Polynomials

    Succinct arguments allow a prover to convince a verifier of the validity of any statement in a language, with minimal communication and verifier’s...
    Valerio Cini, Russell W. F. Lai, Giulio Malavolta in Advances in Cryptology – CRYPTO 2023
    Conference paper 2023
  19. A Cross-domain Authentication Scheme Based on Zero-Knowledge Proof

    This paper proposes an anonymous, cross-domain authentication scheme based on zero-knowledge proof to combat the privacy leakage problem of...
    Ruizhong Du, **aoya Li, Yan Liu in Algorithms and Architectures for Parallel Processing
    Conference paper 2022
  20. Efficient NIZK Arguments with Straight-Line Simulation and Extraction

    Non-interactive zero-knowledge (NIZK) arguments allow a prover to convince a verifier about the truthfulness of an...
    Michele Ciampi, Ivan Visconti in Cryptology and Network Security
    Conference paper 2022
Did you find what you were looking for? Share feedback.