Noninteractive zero knowledge for NP from (plain) learning with errors
C Peikert, S Shiehian - Annual International Cryptology Conference, 2019 - Springer
We finally close the long-standing problem of constructing a noninteractive zero-knowledge
(NIZK) proof system for any NP language with security based on the plain Learning With …
(NIZK) proof system for any NP language with security based on the plain Learning With …
Cryptographic group actions and applications
N Alamati, L De Feo, H Montgomery… - Advances in Cryptology …, 2020 - Springer
Isogeny-based assumptions have emerged as a viable option for quantum-secure
cryptography. Recent works have shown how to build efficient (public-key) primitives from …
cryptography. Recent works have shown how to build efficient (public-key) primitives from …
Fiat-Shamir: from practice to theory
We give new instantiations of the Fiat-Shamir transform using explicit, efficiently computable
hash functions. We improve over prior work by reducing the security of these protocols to …
hash functions. We improve over prior work by reducing the security of these protocols to …
SNARGs for from LWE
We provide the first construction of a succinct non-interactive argument (SNARG) for all
polynomial time deterministic computations based on standard assumptions. For T steps of …
polynomial time deterministic computations based on standard assumptions. For T steps of …
[HTML][HTML] Proofs, arguments, and zero-knowledge
J Thaler - Foundations and Trends® in Privacy and Security, 2022 - nowpublishers.com
Interactive proofs (IPs) and arguments are cryptographic protocols that enable an untrusted
prover to provide a guarantee that it performed a requested computation correctly …
prover to provide a guarantee that it performed a requested computation correctly …
Correlation intractability and SNARGs from sub-exponential DDH
We provide the first constructions of SNARGs for Batch-NP and P based solely on the sub-
exponential Decisional Diffie Hellman (DDH) assumption. Our schemes achieve poly …
exponential Decisional Diffie Hellman (DDH) assumption. Our schemes achieve poly …
Non-interactive batch arguments for NP from standard assumptions
We study the problem of designing non-interactive batch arguments for NP NP. Such an
argument system allows an efficient prover to prove multiple NP NP statements, with size …
argument system allows an efficient prover to prove multiple NP NP statements, with size …
SNARGs for bounded depth computations and PPAD hardness from sub-exponential LWE
We construct a succinct non-interactive publicly-verifiable delegation scheme for any log-
space uniform circuit under the sub-exponential Learning With Errors (LWE) assumption. For …
space uniform circuit under the sub-exponential Learning With Errors (LWE) assumption. For …
Fiat-Shamir security of FRI and related snarks
We establish new results on the Fiat-Shamir (FS) security of several protocols that are widely
used in practice, and we provide general tools for establishing similar results for others …
used in practice, and we provide general tools for establishing similar results for others …
Fiat–shamir via list-recoverable codes (or: parallel repetition of gmw is not zero-knowledge)
In a seminal work, Goldreich, Micali and Wigderson (CRYPTO'86) demonstrated the wide
applicability of zero-knowledge proofs by constructing such a proof system for the NP …
applicability of zero-knowledge proofs by constructing such a proof system for the NP …