Zerocash: Decentralized anonymous payments from bitcoin

EB Sasson, A Chiesa, C Garman… - … IEEE symposium on …, 2014 - ieeexplore.ieee.org
Bit coin is the first digital currency to see widespread adoption. While payments are
conducted between pseudonyms, Bit coin cannot offer strong privacy guarantees: payment …

Candidate indistinguishability obfuscation and functional encryption for all circuits

S Garg, C Gentry, S Halevi, M Raykova, A Sahai… - SIAM Journal on …, 2016 - SIAM
In this work, we study indistinguishability obfuscation and functional encryption for general
circuits: Indistinguishability obfuscation requires that given any two equivalent circuits C_0 …

SNARKs for C: Verifying program executions succinctly and in zero knowledge

E Ben-Sasson, A Chiesa, D Genkin, E Tromer… - Annual cryptology …, 2013 - Springer
An argument system for NP is a proof system that allows efficient verification of NP
statements, given proofs produced by an untrusted yet computationally-bounded prover …

Noninteractive zero knowledge for NP from (plain) learning with errors

C Peikert, S Shiehian - Annual International Cryptology Conference, 2019 - Springer
We finally close the long-standing problem of constructing a noninteractive zero-knowledge
(NIZK) proof system for any NP language with security based on the plain Learning With …

Quadratic span programs and succinct NIZKs without PCPs

R Gennaro, C Gentry, B Parno, M Raykova - Advances in Cryptology …, 2013 - Springer
We introduce a new characterization of the NP complexity class, called Quadratic Span
Programs (QSPs), which is a natural extension of span programs defined by Karchmer and …

On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption

A López-Alt, E Tromer, V Vaikuntanathan - Proceedings of the forty …, 2012 - dl.acm.org
We propose a new notion of secure multiparty computation aided by a computationally-
powerful but untrusted" cloud" server. In this notion that we call on-the-fly multiparty …

[图书][B] A fully homomorphic encryption scheme

C Gentry - 2009 - search.proquest.com
We propose the first fully homomorphic encryption scheme, solving an old open problem.
Such a scheme allows one to compute arbitrary functions over encrypted data without the …

Candidate multilinear maps from ideal lattices

S Garg, C Gentry, S Halevi - … 32nd Annual International Conference on the …, 2013 - Springer
We describe plausible lattice-based constructions with properties that approximate the
sought-after multilinear maps in hard-discrete-logarithm groups, and show an example …

Decentralizing attribute-based encryption

A Lewko, B Waters - Annual international conference on the theory and …, 2011 - Springer
Abstract We propose a Multi-Authority Attribute-Based Encryption (ABE) system. In our
system, any party can become an authority and there is no requirement for any global …

Fully homomorphic encryption over the integers

M Van Dijk, C Gentry, S Halevi… - Advances in Cryptology …, 2010 - Springer
We construct a simple fully homomorphic encryption scheme, using only elementary
modular arithmetic. We use Gentry's technique to construct a fully homomorphic scheme …