An Efficient Transform from Sigma Protocols to NIZK with a CRS and Non-programmable Random Oracle
暂无分享,去创建一个
[1] Torben P. Pedersen. Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing , 1991, CRYPTO.
[2] Oded Goldreich,et al. Definitions and properties of zero-knowledge proof systems , 1994, Journal of Cryptology.
[3] Yevgeniy Dodis,et al. Efficient Constructions of Composable Commitments and Zero-Knowledge Proofs , 2008, CRYPTO.
[4] Manuel Blum,et al. Non-interactive zero-knowledge and its applications , 1988, STOC '88.
[5] Ivan Damgård,et al. Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols , 1994, CRYPTO.
[6] Adi Shamir,et al. Multiple NonInteractive Zero Knowledge Proofs Under General Assumptions , 1999, SIAM J. Comput..
[7] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[8] Oded Goldreich. Basing Non-Interactive Zero-Knowledge on (Enhanced) Trapdoor Permutations: The State of the Art , 2011, Studies in Complexity and Cryptography.
[9] Amos Fiat,et al. How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.
[10] Ran Canetti,et al. The random oracle methodology, revisited , 2000, JACM.
[11] Pim Tuyls,et al. Practical Two-Party Computation Based on the Conditional Gate , 2004, ASIACRYPT.
[12] Yehuda Lindell. Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries , 2013, CRYPTO.
[13] Yehuda Lindell,et al. Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer , 2010, IACR Cryptol. ePrint Arch..
[14] Yehuda Lindell,et al. Lower bounds for non-black-box zero knowledge , 2003, 44th Annual IEEE Symposium on Foundations of Computer Science, 2003. Proceedings..
[15] Yael Tauman Kalai,et al. On the (In)security of the Fiat-Shamir paradigm , 2003, 44th Annual IEEE Symposium on Foundations of Computer Science, 2003. Proceedings..
[16] Vitaly Shmatikov,et al. Efficient Two-Party Secure Computation on Committed Inputs , 2007, EUROCRYPT.
[17] Adi Shamir,et al. Witness indistinguishable and witness hiding protocols , 1990, STOC '90.
[18] Claudio Orlandi,et al. LEGO for Two-Party Secure Computation , 2009, TCC.
[19] Yehuda Lindell,et al. Efficient Secure Two-Party Protocols: Techniques and Constructions , 2010 .
[20] Yehuda Lindell,et al. Efficient Secure Two-Party Protocols , 2010, Information Security and Cryptography.
[21] Jacques Stern,et al. Security Proofs for Signature Schemes , 1996, EUROCRYPT.
[22] Ivan Damgård,et al. Efficient Concurrent Zero-Knowledge in the Auxiliary String Model , 2000, EUROCRYPT.
[23] Ivan Damgård,et al. On the Existence of Bit Commitment Schemes and Zero-Knowledge Proofs , 1989, CRYPTO.
[24] Yevgeniy Dodis,et al. Randomness Condensers for Efficiently Samplable, Seed-Dependent Sources , 2012, TCC.
[25] Jesper Buus Nielsen,et al. Separating Random Oracle Proofs from Complexity Theoretic Proofs: The Non-committing Encryption Case , 2002, CRYPTO.
[26] I. Damgård,et al. The protocols. , 1989, The New Zealand nursing journal. Kai tiaki.
[27] Hoeteck Wee. Zero Knowledge in the Random Oracle Model, Revisited , 2009, ASIACRYPT.
[28] Abhi Shelat,et al. Two-Output Secure Computation with Malicious Adversaries , 2011, EUROCRYPT.
[29] Ivan Visconti,et al. A Transform for NIZK Almost as Efficient and General as the Fiat-Shamir Transform Without Programmable Random Oracles , 2016, IACR Cryptol. ePrint Arch..
[30] Silvio Micali,et al. How to Prove all NP-Statements in Zero-Knowledge, and a Methodology of Cryptographic Protocol Design , 1986, CRYPTO.
[31] Ran Canetti,et al. The random oracle methodology, revisited , 2000, JACM.
[32] Rafael Pass,et al. On Deniability in the Common Reference String and Random Oracle Model , 2003, CRYPTO.
[33] Silvio Micali,et al. The knowledge complexity of interactive proof-systems , 1985, STOC '85.
[34] Ivan Visconti,et al. Hybrid commitments and their applications to zero-knowledge proof systems , 2007, Theor. Comput. Sci..