Succinct vector, polynomial, and functional commitments from lattices
Vector commitment schemes allow a user to commit to a vector of values x∈{0, 1} ℓ and
later, open up the commitment to a specific set of positions. Both the size of the commitment …
later, open up the commitment to a specific set of positions. Both the size of the commitment …
S-BDS: An effective blockchain-based data storage scheme in zero-trust IoT
J Wang, J Chen, N Xiong, O Alfarraj, A Tolba… - ACM Transactions on …, 2023 - dl.acm.org
With the development of the Internet of Things (IoT), a large-scale, heterogeneous, and
dynamic distributed network has been formed among IoT devices. There is an extreme need …
dynamic distributed network has been formed among IoT devices. There is an extreme need …
Functional commitments for all functions, with transparent setup and from SIS
L de Castro, C Peikert - Annual International Conference on the Theory …, 2023 - Springer
A functional commitment scheme enables a user to concisely commit to a function from a
specified family, then later concisely and verifiably reveal values of the function at desired …
specified family, then later concisely and verifiably reveal values of the function at desired …
[HTML][HTML] Tethering Layer 2 solutions to the blockchain: A survey on proving schemes
A blockchain is a data structure consisting of a list of blocks containing transactions and
maintained by a network of nodes in a decentralized manner. In permissionless blockchains …
maintained by a network of nodes in a decentralized manner. In permissionless blockchains …
Cuckoo commitments: Registration-based encryption and key-value map commitments for large spaces
Abstract Registration-Based Encryption (RBE)[Garg et al. TCC'18] is a public-key encryption
mechanism in which users generate their own public and secret keys, and register their …
mechanism in which users generate their own public and secret keys, and register their …
Lattice-based functional commitments: Fast verification and cryptanalysis
A functional commitment allows a user to commit to an input x∈{0, 1} ℓ and later open up the
commitment to a value y= f (x) with respect to some function f. In this work, we focus on …
commitment to a value y= f (x) with respect to some function f. In this work, we focus on …
Hyperproofs: Aggregating and maintaining proofs in vector commitments
S Srinivasan, A Chepurnoy, C Papamanthou… - 31st USENIX Security …, 2022 - usenix.org
We present Hyperproofs, the first vector commitment (VC) scheme that is efficiently
maintainable and aggregatable. Similar to Merkle proofs, our proofs form a tree that can be …
maintainable and aggregatable. Similar to Merkle proofs, our proofs form a tree that can be …
Baloo: nearly optimal lookup arguments
A Zapico, A Gabizon, D Khovratovich… - Cryptology ePrint …, 2022 - eprint.iacr.org
We present Baloo, the first protocol for lookup tables where the prover work is linear on the
amount of lookups and independent of the size of the table. Baloo is built over the lookup …
amount of lookups and independent of the size of the table. Baloo is built over the lookup …
{BalanceProofs}: Maintainable vector commitments with fast aggregation
W Wang, A Ulichney, C Papamanthou - 32nd USENIX Security …, 2023 - usenix.org
We present BalanceProofs, the first vector commitment that is maintainable (ie, supporting
sublinear updates) while also enjoying fast proof aggregation and verification. The basic …
sublinear updates) while also enjoying fast proof aggregation and verification. The basic …
Speranza: Usable, privacy-friendly software signing
K Merrill, Z Newman, S Torres-Arias… - Proceedings of the 2023 …, 2023 - dl.acm.org
Software repositories, used for wide-scale open software distribution, are a significant vector
for security attacks. Software signing provides authenticity, mitigating many such attacks …
for security attacks. Software signing provides authenticity, mitigating many such attacks …