We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 61-80 of 10,000 results
  1. Practical Non-interactive Publicly Verifiable Secret Sharing with Thousands of Parties

    Non-interactive publicly verifiable secret sharing (PVSS) schemes enables (re-)sharing of secrets in a decentralized setting in the presence of...
    Craig Gentry, Shai Halevi, Vadim Lyubashevsky in Advances in Cryptology – EUROCRYPT 2022
    Conference paper 2022
  2. Secure Non-interactive Reducibility is Decidable

    Secure Non-Interactive Reductions (SNIR) is a recently introduced, but fundamental cryptographic primitive. The basic question about SNIRs is how to...
    Kaartik Bhushan, Ankit Kumar Misra, ... Manoj Prabhakaran in Theory of Cryptography
    Conference paper 2022
  3. Non-interactive Distributional Indistinguishability (NIDI) and Non-malleable Commitments

    We introduce non-interactive distributionally indistinguishable arguments (NIDI) to address a significant weakness of NIWI proofs: namely, the lack...
    Conference paper 2021
  4. Conflict-Driven Satisfiability for Theory Combination: Lemmas, Modules, and Proofs

    Search-based satisfiability procedures try to build a model of the input formula by simultaneously proposing candidate models and deriving new...

    Maria Paola Bonacina, Stéphane Graham-Lengrand, Natarajan Shankar in Journal of Automated Reasoning
    Article Open access 12 September 2021
  5. Combining Proofs for Description Logic and Concrete Domain Reasoning

    Logic-based approaches to AI have the advantage that their behavior can in principle be explained with the help of proofs of the computed...
    Christian Alrabbaa, Franz Baader, ... Alisa Kovtunova in Rules and Reasoning
    Conference paper 2023
  6. Rogue-Instance Security for Batch Knowledge Proofs

    We propose a new notion of knowledge soundness, denoted rogue-instance security, for interactive and non-interactive batch knowledge proofs. Our...
    Gil Segev, Amit Sharabi, Eylon Yogev in Theory of Cryptography
    Conference paper 2023
  7. Code-based signatures from new proofs of knowledge for the syndrome decoding problem

    In this paper, we study code-based signatures constructed from Proofs of Knowledge (PoK). This line of work can be traced back to Stern who...

    Loïc Bidoux, Philippe Gaborit, ... Victor Mateu in Designs, Codes and Cryptography
    Article 13 October 2022
  8. SNACKs: Leveraging Proofs of Sequential Work for Blockchain Light Clients

    The success of blockchains has led to ever-growing ledgers that are stored by all participating full nodes. In contrast, light clients only store...
    Hamza Abusalah, Georg Fuchsbauer, ... Karen Klein in Advances in Cryptology – ASIACRYPT 2022
    Conference paper 2022
  9. Non-Interactive Anonymous Router

    Anonymous routing is one of the most fundamental online privacy problems and has been studied extensively for decades. Almost all known approaches...
    Conference paper 2021
  10. Malleable Commitments from Group Actions and Zero-Knowledge Proofs for Circuits Based on Isogenies

    Zero-knowledge proofs for NP statements are an essential tool for building various cryptographic primitives and have been extensively studied in...
    Mingjie Chen, Yi-Fu Lai, ... Christophe Petit in Progress in Cryptology – INDOCRYPT 2023
    Conference paper 2024
  11. Proofs of Proof-of-Work

    Living reference work entry 2023
  12. Beyond MPC-in-the-Head: Black-Box Constructions of Short Zero-Knowledge Proofs

    In their seminal work, Ishai, Kushilevitz, Ostrovsky, and Sahai (STOC‘07) presented the MPC-in-the-Head paradigm, which shows how to design...
    Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, Mor Weiss in Theory of Cryptography
    Conference paper 2023
  13. Verifiable Random Functions from Non-interactive Witness-Indistinguishable Proofs

    Verifiable random functions (VRFs) are pseudorandom functions where the owner of the seed, in addition to computing the function’s value y at any...

    Nir Bitansky in Journal of Cryptology
    Article 04 September 2019
  14. LaBRADOR: Compact Proofs for R1CS from Module-SIS

    The most compact quantum-safe proof systems for large circuits are PCP-type systems such as Ligero, Aurora, and Shockwave, that only use weak...
    Ward Beullens, Gregor Seiler in Advances in Cryptology – CRYPTO 2023
    Conference paper 2023
  15. Non-interactive Proofs of Proof-of-Work

    Decentralized consensus protocols based on proof-of-work (PoW) mining require nodes to download data linear in the size of the blockchain even if...
    Aggelos Kiayias, Andrew Miller, Dionysis Zindros in Financial Cryptography and Data Security
    Conference paper 2020
  16. Secure Non-interactive Reduction and Spectral Analysis of Correlations

    Correlated pairs of random variables are a central concept in information-theoretically secure cryptography. Secure reductions between different...
    Pratyush Agarwal, Varun Narayanan, ... Mohammad Ali Rehan in Advances in Cryptology – EUROCRYPT 2022
    Conference paper 2022
  17. Your Reputation’s Safe with Me: Framing-Free Distributed Zero-Knowledge Proofs

    Distributed Zero-Knowledge (dZK) proofs, recently introduced by Boneh et al. (CRYPTO‘19), allow a prover...
    Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, Mor Weiss in Theory of Cryptography
    Conference paper 2023
  18. Parallel Repetition of  \((k_1,\dots ,k_{\mu })\) -Special-Sound Multi-round Interactive Proofs

    In many occasions, the knowledge error \(\kappa \)...
    Thomas Attema, Serge Fehr in Advances in Cryptology – CRYPTO 2022
    Conference paper 2022
  19. Single-to-Multi-theorem Transformations for Non-interactive Statistical Zero-Knowledge

    Non-interactive zero-knowledge proofs or arguments allow a prover to show validity of a statement without further interaction. For non-trivial...
    Marc Fischlin, Felix Rohrbach in Public-Key Cryptography – PKC 2021
    Conference paper 2021
  20. Succinct Interactive Oracle Proofs: Applications and Limitations

    Interactive Oracle Proofs ( \(\textsf{IOP}\) s)...
    Shafik Nassar, Ron D. Rothblum in Advances in Cryptology – CRYPTO 2022
    Conference paper 2022
Did you find what you were looking for? Share feedback.