Succinct {Non-Interactive} zero knowledge for a von neumann architecture

E Ben-Sasson, A Chiesa, E Tromer… - 23rd USENIX Security …, 2014 - usenix.org
We build a system that provides succinct non-interactive zero-knowledge proofs (zk-
SNARKs) for program executions on a von Neumann RISC architecture. The system has two …

An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks without pairings

NW Lo, JL Tsai - IEEE Transactions on Intelligent …, 2015 - ieeexplore.ieee.org
Constructing intelligent and efficient transportation systems for modern metropolitan areas
has become a very important quest for nations possessing metropolitan cities with ever …

Secure anonymous key distribution scheme for smart grid

JL Tsai, NW Lo - IEEE transactions on smart grid, 2015 - ieeexplore.ieee.org
To fully support information management among various stakeholders in smart grid
domains, how to establish secure communication sessions has become an important issue …

Identity-based encryption from the Weil pairing

D Boneh, M Franklin - Annual international cryptology conference, 2001 - Springer
We propose a fully functional identity-based encryption scheme (IBE). The scheme has
chosen ciphertext security in the random oracle model assuming an elliptic curve variant of …

[图书][B] Mathematics of public key cryptography

SD Galbraith - 2012 - books.google.com
Public key cryptography is a major interdisciplinary subject with many real-world
applications, such as digital signatures. A strong background in the mathematics underlying …

[图书][B] Cryptography: theory and practice

DR Stinson - 2005 - api.taylorfrancis.com
THE LEGACYFirst introduced in 1995, Cryptography: Theory and Practice garnered
enormous praise and popularity, and soon became the standard textbook for cryptography …

Short signatures from the Weil pairing

D Boneh, B Lynn, H Shacham - International conference on the theory and …, 2001 - Springer
We introduce a short signature scheme based on the Computational Diffie-Hellman
assumption on certain elliptic and hyper-elliptic curves. The signature length is half the size …

Certificateless public key cryptography

SS Al-Riyami, KG Paterson - International conference on the theory and …, 2003 - Springer
This paper introduces and makes concrete the concept of certificateless public key
cryptography (CL-PKC), a model for the use of public key cryptography which avoids the …

Provably secure and lightweight certificateless signature scheme for IIoT environments

A Karati, SKH Islam, M Karuppiah - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
In recent years, two technologies, the cloud computing and the Internet of Things (IoT), have
a synergistic effect in the modern organizations as digitization is a new business trend for …

Scalable zero knowledge via cycles of elliptic curves

E Ben-Sasson, A Chiesa, E Tromer, M Virza - Algorithmica, 2017 - Springer
Non-interactive zero-knowledge proofs of knowledge for general NP statements are a
powerful cryptographic primitive, both in theory and in practical applications. Recently, much …