We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 81-100 of 10,000 results
  1. Proof of Necessary Work: Succinct State Verification with Fairness Guarantees

    Blockchain-based payment systems utilize an append-only log of transactions whose correctness can be verified by any observer. Classically,...
    Assimakis Kattis, Joseph Bonneau in Financial Cryptography and Data Security
    Conference paper Open access 2024
  2. More Efficient Amortization of Exact Zero-Knowledge Proofs for LWE

    We propose a practical zero-knowledge proof system for proving knowledge of short solutions...
    Jonathan Bootle, Vadim Lyubashevsky, ... Gregor Seiler in Computer Security – ESORICS 2021
    Conference paper 2021
  3. POSMETER: proof-of-stake blockchain for enhanced smart meter data security

    As smart home appliances have grown in popularity; a large amount of data has been created on smart meters pertaining to various consumers. Due to...

    Divya Singhal, Laxmi Ahuja, Ashish Seth in International Journal of Information Technology
    Article 17 December 2023
  4. Authentication, Authorization, and Selective Disclosure for IoT Data Sharing Using Verifiable Credentials and Zero-Knowledge Proofs

    As IoT becomes omnipresent vast amounts of data are generated, which can be used for building innovative applications. However, interoperability...
    Nikos Fotiou, Iakovos Pittaras, ... Stratos Keranidis in Emerging Technologies for Authorization and Authentication
    Conference paper 2023
  5. BooLigero: Improved Sublinear Zero Knowledge Proofs for Boolean Circuits

    We provide a modified version of the Ligero sublinear zero knowledge proof system for arithmetic circuits provided by Ames et al. (CCS ’17). Our...
    Yaron Gvili, Sarah Scheffler, Mayank Varia in Financial Cryptography and Data Security
    Conference paper 2021
  6. Toward Non-interactive Zero-Knowledge Proofs for NP from LWE

    Ron D. Rothblum, Adam Sealfon, Katerina Sotiraki in Journal of Cryptology
    Article 06 January 2021
  7. Single-to-Multi-theorem Transformations for Non-interactive Statistical Zero-Knowledge

    Non-interactive zero-knowledge proofs or arguments allow a prover to show validity of a statement without further interaction. For non-trivial...
    Marc Fischlin, Felix Rohrbach in Public-Key Cryptography – PKC 2021
    Conference paper 2021
  8. Flashproofs: Efficient Zero-Knowledge Arguments of Range and Polynomial Evaluation with Transparent Setup

    We propose Flashproofs, a new type of efficient special honest verifier zero-knowledge arguments with a transparent setup in the discrete logarithm...
    Nan Wang, Sid Chi-Kin Chau in Advances in Cryptology – ASIACRYPT 2022
    Conference paper 2022
  9. On the Concurrent Composition of Quantum Zero-Knowledge

    We study the notion of zero-knowledge secure against quantum polynomial-time verifiers (referred to as quantum zero-knowledge) in the concurrent...
    Prabhanjan Ananth, Kai-Min Chung, Rolando L. La Placa in Advances in Cryptology – CRYPTO 2021
    Conference paper 2021
  10. The Round Complexity of Quantum Zero-Knowledge

    We study the round complexity of zero-knowledge for QMA (the quantum analogue of NP). Assuming the quantum quasi-polynomial hardness of the learning...
    Orestis Chardouvelis, Giulio Malavolta in Theory of Cryptography
    Conference paper 2021
  11. Reverse Firewalls for Oblivious Transfer Extension and Applications to Zero-Knowledge

    In the setting of subversion, an adversary tampers with the machines of the honest parties thus leaking the honest parties’ secrets through the...
    Suvradip Chakraborty, Chaya Ganesh, Pratik Sarkar in Advances in Cryptology – EUROCRYPT 2023
    Conference paper 2023
  12. Shorter Lattice-Based Zero-Knowledge Proofs via One-Time Commitments

    There has been a lot of recent progress in constructing efficient zero-knowledge proofs for showing knowledge of an...
    Vadim Lyubashevsky, Ngoc Khanh Nguyen, Gregor Seiler in Public-Key Cryptography – PKC 2021
    Conference paper 2021
  13. Blockchain-based end-to-end privacy-preserving scheme for IoT-based healthcare systems

    In Internet-of-Things (IoT)-based healthcare systems, real-time healthcare data are gathered from patients’ sensors with limited resources and...

    Maryam Nasr Esfahani, Behrouz Shahgholi Ghahfarokhi, Shahram Etemadi Borujeni in The Journal of Supercomputing
    Article 27 July 2023
  14. Zero-Knowledge Protocols for the Subset Sum Problem from MPC-in-the-Head with Rejection

    We propose (honest verifier) zero-knowledge arguments for the modular subset sum problem. Previous combinatorial approaches, notably one due to...
    Thibauld Feneuil, Jules Maire, ... Damien Vergnaud in Advances in Cryptology – ASIACRYPT 2022
    Conference paper 2022
  15. A gapless code-based hash proof system based on RQC and its applications

    Cramer and Shoup introduced at Eurocrypt’02 the concept of hash proof system, also designated as smooth projective hash functions. Since then, they...

    Slim Bettaieb, Loïc Bidoux, ... Philippe Gaborit in Designs, Codes and Cryptography
    Article 12 August 2022
  16. Super-Perfect Zero-Knowledge Proofs

    We initiate a study of super-perfect zero-knowledge proof systems. Loosely speaking, these are proof systems for which the interaction can be...
    Oded Goldreich, Liav Teichner in Computational Complexity and Property Testing
    Chapter 2020
  17. CoProver: A Recommender System for Proof Construction

    Interactive Theorem Provers (ITPs) are an indispensable tool in the arsenal of formal method experts as a platform for construction and (formal)...
    Eric Yeh, Briland Hitaj, ... Natarajan Shankar in Intelligent Computer Mathematics
    Conference paper 2023
  18. Zero-Knowledge Proofs for Set Membership: Efficient, Succinct, Modular

    We consider the problem of proving in zero knowledge that an element of a public set satisfies a given property without disclosing the element, i.e.,...
    Daniel Benarroch, Matteo Campanelli, ... Dimitris Kolonelos in Financial Cryptography and Data Security
    Conference paper 2021
  19. Connecting the dots between stance and fake news detection with blockchain, proof of reputation, and the Hoeffding bound

    Combating fake news is a crucial endeavor, yet the complexity of the task requires multifaceted approaches that transcend singular technological...

    Ilhem Salah, Khaled Jouini, ... Ouajdi Korbaa in Cluster Computing
    Article 27 June 2024
  20. Making an eBPF Virtual Machine Faster on Microcontrollers: Verified Optimization and Proof Simplification

    As a revolutionary kernel extension technology, Berkeley Packet Filters (BPF) has been applied for various operating systems from different domains,...
    Shenghao Yuan, Benjamin Lion, ... Jean-Pierre Talpin in Dependable Software Engineering. Theories, Tools, and Applications
    Conference paper 2024
Did you find what you were looking for? Share feedback.