Succinct vector, polynomial, and functional commitments from lattices

H Wee, DJ Wu - Annual International Conference on the Theory and …, 2023 - Springer
Vector commitment schemes allow a user to commit to a vector of values x∈{0, 1} ℓ and
later, open up the commitment to a specific set of positions. Both the size of the commitment …

S-BDS: An effective blockchain-based data storage scheme in zero-trust IoT

J Wang, J Chen, N Xiong, O Alfarraj, A Tolba… - ACM Transactions on …, 2023 - dl.acm.org
With the development of the Internet of Things (IoT), a large-scale, heterogeneous, and
dynamic distributed network has been formed among IoT devices. There is an extreme need …

Functional commitments for all functions, with transparent setup and from SIS

L de Castro, C Peikert - Annual International Conference on the Theory …, 2023 - Springer
A functional commitment scheme enables a user to concisely commit to a function from a
specified family, then later concisely and verifiably reveal values of the function at desired …

[HTML][HTML] Tethering Layer 2 solutions to the blockchain: A survey on proving schemes

D Tortola, A Lisi, P Mori, L Ricci - Computer Communications, 2024 - Elsevier
A blockchain is a data structure consisting of a list of blocks containing transactions and
maintained by a network of nodes in a decentralized manner. In permissionless blockchains …

Cuckoo commitments: Registration-based encryption and key-value map commitments for large spaces

D Fiore, D Kolonelos, P Perthuis - … on the Theory and Application of …, 2023 - Springer
Abstract Registration-Based Encryption (RBE)[Garg et al. TCC'18] is a public-key encryption
mechanism in which users generate their own public and secret keys, and register their …

Lattice-based functional commitments: Fast verification and cryptanalysis

H Wee, DJ Wu - International Conference on the Theory and …, 2023 - Springer
A functional commitment allows a user to commit to an input x∈{0, 1} ℓ and later open up the
commitment to a value y= f (x) with respect to some function f. In this work, we focus on …

Hyperproofs: Aggregating and maintaining proofs in vector commitments

S Srinivasan, A Chepurnoy, C Papamanthou… - 31st USENIX Security …, 2022 - usenix.org
We present Hyperproofs, the first vector commitment (VC) scheme that is efficiently
maintainable and aggregatable. Similar to Merkle proofs, our proofs form a tree that can be …

Baloo: nearly optimal lookup arguments

A Zapico, A Gabizon, D Khovratovich… - Cryptology ePrint …, 2022 - eprint.iacr.org
We present Baloo, the first protocol for lookup tables where the prover work is linear on the
amount of lookups and independent of the size of the table. Baloo is built over the lookup …

{BalanceProofs}: Maintainable vector commitments with fast aggregation

W Wang, A Ulichney, C Papamanthou - 32nd USENIX Security …, 2023 - usenix.org
We present BalanceProofs, the first vector commitment that is maintainable (ie, supporting
sublinear updates) while also enjoying fast proof aggregation and verification. The basic …

Speranza: Usable, privacy-friendly software signing

K Merrill, Z Newman, S Torres-Arias… - Proceedings of the 2023 …, 2023 - dl.acm.org
Software repositories, used for wide-scale open software distribution, are a significant vector
for security attacks. Software signing provides authenticity, mitigating many such attacks …