Functional commitments for all functions, with transparent setup and from SIS

L de Castro, C Peikert - Annual International Conference on the Theory …, 2023 - Springer
A functional commitment scheme enables a user to concisely commit to a function from a
specified family, then later concisely and verifiably reveal values of the function at desired …

Cuckoo commitments: Registration-based encryption and key-value map commitments for large spaces

D Fiore, D Kolonelos, P Perthuis - … on the Theory and Application of …, 2023 - Springer
Abstract Registration-Based Encryption (RBE)[Garg et al. TCC'18] is a public-key encryption
mechanism in which users generate their own public and secret keys, and register their …

Baloo: nearly optimal lookup arguments

A Zapico, A Gabizon, D Khovratovich… - Cryptology ePrint …, 2022 - eprint.iacr.org
We present Baloo, the first protocol for lookup tables where the prover work is linear on the
amount of lookups and independent of the size of the table. Baloo is built over the lookup …

Zswap: zk-SNARK based non-interactive multi-asset swaps

F Engelmann, T Kerber, M Kohlweiss… - Cryptology ePrint …, 2022 - eprint.iacr.org
Privacy-oriented cryptocurrencies, like Zcash or Monero, provide fair transaction anonymity
and confidentiality but lack important features compared to fully public systems, like …

Techniques for Authenticating Quantile Digests

A Scala - arXiv preprint arXiv:2401.10118, 2024 - arxiv.org
We investigate two possible techniques to authenticate the q-digest data structure, along
with a worst-case study of the computational complexity both in time and space of the …

Malleable zero-knowledge proofs and applications

M Volkhov - 2023 - era.ed.ac.uk
In recent years, the field of privacy-preserving technologies has experienced considerable
expansion, with zero-knowledge proofs (ZKPs) playing one of the most prominent roles …