A survey of certificateless encryption schemes and security models

AW Dent - International Journal of Information Security, 2008 - Springer
This paper surveys the literature on certificateless encryption schemes. In particular, we
examine the large number of security models that have been proposed to prove the security …

The algebraic group model and its applications

G Fuchsbauer, E Kiltz, J Loss - … in Cryptology–CRYPTO 2018: 38th Annual …, 2018 - Springer
One of the most important and successful tools for assessing hardness assumptions in
cryptography is the Generic Group Model (GGM). Over the past two decades, numerous …

Pinocchio: Nearly practical verifiable computation

B Parno, J Howell, C Gentry, M Raykova - Communications of the ACM, 2016 - dl.acm.org
To instill greater confidence in computations outsourced to the cloud, clients should be able
to verify the correctness of the results returned. To this end, we introduce Pinocchio, a built …

[HTML][HTML] Cryptographic primitives in blockchains

L Wang, X Shen, J Li, J Shao, Y Yang - Journal of Network and Computer …, 2019 - Elsevier
Blockchain, as one of the crypto-intensive creatures, has become a very hot topic recently.
Although many surveys have recently been dedicated to the security and privacy issues of …

SNARKs for C: Verifying program executions succinctly and in zero knowledge

E Ben-Sasson, A Chiesa, D Genkin, E Tromer… - Annual cryptology …, 2013 - Springer
An argument system for NP is a proof system that allows efficient verification of NP
statements, given proofs produced by an untrusted yet computationally-bounded prover …

Quadratic span programs and succinct NIZKs without PCPs

R Gennaro, C Gentry, B Parno, M Raykova - Advances in Cryptology …, 2013 - Springer
We introduce a new characterization of the NP complexity class, called Quadratic Span
Programs (QSPs), which is a natural extension of span programs defined by Karchmer and …

[图书][B] Handbook of applied cryptography

AJ Menezes, PC Van Oorschot, SA Vanstone - 2018 - taylorfrancis.com
Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an
important discipline that is not only the subject of an enormous amount of research, but …

Random oracles are practical: A paradigm for designing efficient protocols

M Bellare, P Rogaway - Proceedings of the 1st ACM Conference on …, 1993 - dl.acm.org
We argue that the random oracle model—where all parties have access to a public random
oracle—provides a bridge between cryptographic theory and cryptographic practice. In the …

Provable data possession at untrusted stores

G Ateniese, R Burns, R Curtmola, J Herring… - Proceedings of the 14th …, 2007 - dl.acm.org
We introduce a model for provable data possession (PDP) that allows a client that has
stored data at an untrusted server to verify that the server possesses the original data …

From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again

N Bitansky, R Canetti, A Chiesa, E Tromer - Proceedings of the 3rd …, 2012 - dl.acm.org
The existence of succinct non-interactive arguments for NP (ie, non-interactive
computationally-sound proofs where the verifier's work is essentially independent of the …