A survey on exotic signatures for post-quantum blockchain: Challenges and research directions
Blockchain technology provides efficient and secure solutions to various online activities by
utilizing a wide range of cryptographic tools. In this article, we survey the existing literature …
utilizing a wide range of cryptographic tools. In this article, we survey the existing literature …
[PDF][PDF] Status report on the second round of the NIST post-quantum cryptography standardization process
G Alagic, J Alperin-Sheriff, D Apon… - US Department of …, 2020 - nvlpubs.nist.gov
Abstract The National Institute of Standards and Technology is in the process of selecting
one or more public-key cryptographic algorithms through a public, competition-like process …
one or more public-key cryptographic algorithms through a public, competition-like process …
Ligero: Lightweight sublinear arguments without a trusted setup
We design and implement a simple zero-knowledge argument protocol for NP whose
communication complexity is proportional to the square-root of the verification circuit size …
communication complexity is proportional to the square-root of the verification circuit size …
Wolverine: fast, scalable, and communication-efficient zero-knowledge proofs for boolean and arithmetic circuits
Efficient zero-knowledge (ZK) proofs for arbitrary boolean or arithmetic circuits have recently
attracted much attention. Existing solutions suffer from either significant prover overhead (ie …
attracted much attention. Existing solutions suffer from either significant prover overhead (ie …
Publicly verifiable zero-knowledge and post-quantum signatures from vole-in-the-head
We present a new method for transforming zero-knowledge protocols in the designated
verifier setting into public-coin protocols, which can be made non-interactive and publicly …
verifier setting into public-coin protocols, which can be made non-interactive and publicly …
One tree to rule them all: Optimizing ggm trees and owfs for post-quantum signatures
The use of MPC-in-the-Head (MPCitH) based zero knowledge proofs of knowledge (ZKPoK)
to prove knowledge of a preimage of a one-way function (OWF) is a popular approach …
to prove knowledge of a preimage of a one-way function (OWF) is a popular approach …
Threshold linear secret sharing to the rescue of MPC-in-the-head
The MPC-in-the-Head paradigm is a popular framework to build zero-knowledge proof
systems using techniques from secure multi-party computation (MPC). While this paradigm …
systems using techniques from secure multi-party computation (MPC). While this paradigm …
Limbo: efficient zero-knowledge MPCitH-based arguments
C Delpech de Saint Guilhem, E Orsini… - Proceedings of the 2021 …, 2021 - dl.acm.org
This work introduces a new interactive oracle proof system based on the MPC-in-the-Head
paradigm. To improve concrete efficiency and offer flexibility between computation time and …
paradigm. To improve concrete efficiency and offer flexibility between computation time and …
Shared permutation for syndrome decoding: new zero-knowledge protocol and code-based signature
The threat of a coming quantum computer motivates the research for new zero-knowledge
proof techniques for (or based on) post-quantum cryptographic problems. One of the few …
proof techniques for (or based on) post-quantum cryptographic problems. One of the few …
Banquet: short and fast signatures from AES
This work introduces Banquet, a digital signature scheme with post-quantum security,
constructed using only symmetric-key primitives. The design is based on the MPC-in-head …
constructed using only symmetric-key primitives. The design is based on the MPC-in-head …