We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Succinct Non-Interactive Arguments via Linear Interactive Proofs

    Succinct non-interactive arguments (SNARGs) enable verifying NP statements with lower complexity than required for classical NP verification....

    Nir Bitansky, Alessandro Chiesa, ... Omer Paneth in Journal of Cryptology
    Article Open access 02 May 2022
  2. Non-interactive Zero-Knowledge Functional Proofs

    In this paper, we consider to generalize NIZK by empowering a prover to share a witness in a fine-grained manner with verifiers. Roughly, the prover...
    Gongxian Zeng, Junzuo Lai, ... Jian Weng in Advances in Cryptology – ASIACRYPT 2023
    Conference paper 2023
  3. Non-interactive Universal Arguments

    In 2002, Barak and Goldreich introduced the notion of a universal argument and constructed an interactive universal argument for non-deterministic...
    Nir Bitansky, Omer Paneth, ... Tomer Solomon in Advances in Cryptology – CRYPTO 2023
    Conference paper 2023
  4. Non-interactive Zero-Knowledge Proofs to Multiple Verifiers

    In this paper, we study zero-knowledge (ZK) proofs for circuit satisfiability that can prove to n verifiers at a time efficiently. The proofs are...
    Conference paper 2022
  5. Non-interactive SM2 threshold signature scheme with identifiable abort

    A threshold signature is a special digital signature in which the N -signer share the private key x and can construct a valid signature for any subset...

    Huiqiang Liang, Jianhua Chen in Frontiers of Computer Science
    Article 12 August 2023
  6. Non-interactive Zero-Knowledge from Non-interactive Batch Arguments

    Zero-knowledge and succinctness are two important properties that arise in the study of non-interactive arguments. Previously, Kitagawa et al. (TCC...
    Jeffrey Champion, David J. Wu in Advances in Cryptology – CRYPTO 2023
    Conference paper 2023
  7. Efficient Non-interactive Anonymous Communication

    Methods for untraceable and anonymous communication, such as anonymous routing networks and dining cryptographers networks, are in general very...
    Sigurd Eskeland, Svetlana Boudko in ICT Systems Security and Privacy Protection
    Conference paper 2024
  8. Doubly Efficient Interactive Proofs over Infinite and Non-commutative Rings

    We introduce the first proof system for layered arithmetic circuits over an arbitrary ring R that is (possibly) non-commutative and (possibly)...
    Eduardo Soria-Vazquez in Theory of Cryptography
    Conference paper 2022
  9. Non-Interactive Zero-Knowledge Proofs with Fine-Grained Security

    We construct the first non-interactive zero-knowledge (NIZK) proof systems in the fine-grained setting where adversaries’ resources are bounded and...
    Conference paper 2022
  10. Simple, Fast, Efficient, and Tightly-Secure Non-malleable Non-interactive Timed Commitments

    Timed commitment schemes, introduced by Boneh and Naor (CRYPTO 2000), can be used to achieve fairness in secure computation protocols in a simple and...
    Peter Chvojka, Tibor Jager in Public-Key Cryptography – PKC 2023
    Conference paper 2023
  11. Fiat–Shamir Transformation of Multi-Round Interactive Proofs (Extended Version)

    The celebrated Fiat–Shamir transformation turns any public-coin interactive proof into a non-interactive one, which inherits the main security...

    Thomas Attema, Serge Fehr, Michael Klooß in Journal of Cryptology
    Article Open access 08 August 2023
  12. Strong Batching for Non-interactive Statistical Zero-Knowledge

    A zero-knowledge proof enables a prover to convince a verifier that $$x \in...
    Changrui Mu, Shafik Nassar, ... Prashant Nalini Vasudevan in Advances in Cryptology – EUROCRYPT 2024
    Conference paper 2024
  13. An efficient quantum non-interactive zero knowledge proof for confidential transaction and quantum range proof

    This paper investigated the Bitcoin blockchain and other crypto currencies confidential transaction techniques for cryptographic commitment in a...

    B. Sriman, S. Ganesh Kumar in Multimedia Tools and Applications
    Article 08 February 2024
  14. Enhancing security in Fiat–Shamir transformation-based non-interactive zero-knowledge protocols for IoT authentication

    With the rapid expansion of IoT devices and their applications, there is an increasing demand for efficient and secure authentication mechanisms to...

    Firas Hamila, Mohammad Hamad, ... Sebastian Steinhorst in International Journal of Information Security
    Article Open access 25 November 2023
  15. Automated generation of illustrated proofs in geometry and beyond

    Illustrations are only rarely formal components of mathematical proofs, however they are often very important for understanding proofs. Illustrations...

    Predrag Janičić, Julien Narboux in Annals of Mathematics and Artificial Intelligence
    Article 03 July 2023
  16. On Non-uniform Security for Black-Box Non-interactive CCA Commitments

    We obtain a black-box construction of non-interactive CCA commitments against non-uniform adversaries. This makes black-box use of an appropriate...
    Rachit Garg, Dakshita Khurana, ... Brent Waters in Advances in Cryptology – EUROCRYPT 2023
    Conference paper 2023
  17. Non-interactive Blind Signatures for Random Messages

    Blind signatures allow a signer to issue signatures on messages chosen by the signature recipient. The main property is that the recipient’s message...
    Conference paper 2023
  18. Efficient multivariate low-degree tests via interactive oracle proofs of proximity for polynomial codes

    We consider the proximity testing problem for error-correcting codes which consist in evaluations of multivariate polynomials either of bounded...

    Daniel Augot, Sarah Bordage, Jade Nardi in Designs, Codes and Cryptography
    Article 13 November 2022
  19. Non-interactive Commitment from Non-transitive Group Actions

    Group actions are becoming a viable option for post-quantum cryptography assumptions. Indeed, in recent years some works have shown how to construct...
    Giuseppe D’Alconzo, Andrea Flamini, Andrea Gangemi in Advances in Cryptology – ASIACRYPT 2023
    Conference paper 2023
  20. Schematic Program Proofs with Abstract Execution

    We propose Abstract Execution , a static verification framework based on symbolic execution and dynamic frames for proving properties of schematic ...

    Dominic Steinhöfel, Reiner Hähnle in Journal of Automated Reasoning
    Article Open access 26 March 2024
Did you find what you were looking for? Share feedback.