ZK-PCPs from Leakage-Resilient Secret Sharing
暂无分享,去创建一个
Carmit Hazay | Mor Weiss | Muthuramakrishnan Venkitasubramaniam | Muthuramakrishnan Venkitasubramaniam | Carmit Hazay | Mor Weiss
[1] Tal Malkin,et al. A Black-Box Construction of Non-malleable Encryption from Semantically Secure Encryption , 2017, Journal of Cryptology.
[2] Stefan Dziembowski,et al. Leakage-Resilient Storage , 2010, SCN.
[3] DinurIrit. The PCP theorem by gap amplification , 2007 .
[4] Stefan Dziembowski,et al. Intrusion-Resilient Secret Sharing , 2007, 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07).
[5] Dana Ron,et al. Computational sample complexity , 1997, COLT '97.
[6] Yuval Ishai,et al. On Adaptive vs. Non-adaptive Security of Multiparty Protocols , 2001, EUROCRYPT.
[7] Sanjeev Arora,et al. Probabilistic checking of proofs: a new characterization of NP , 1998, JACM.
[8] Tal Malkin,et al. Non-malleable Codes for Bounded Depth, Bounded Fan-In Circuits , 2016, EUROCRYPT.
[9] Ivan Damgård,et al. Secure Multiparty Computation and Secret Sharing , 2015 .
[10] Tal Malkin,et al. Black-Box Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One , 2008, TCC.
[11] Eli Ben-Sasson,et al. Short PCPs with Polylog Query Complexity , 2008, SIAM J. Comput..
[12] Joe Kilian,et al. Probabilistically checkable proofs with zero knowledge , 1997, STOC '97.
[13] Ivan Damgård,et al. Stronger Leakage-Resilient and Non-Malleable Secret-Sharing Schemes for General Access Structures , 2019, IACR Cryptol. ePrint Arch..
[14] Dana Ron,et al. A Probabilistic Error-Correcting Scheme , 1997, IACR Cryptol. ePrint Arch..
[15] Li-Yang Tan,et al. Non-Malleable Codes for Small-Depth Circuits , 2018, 2018 IEEE 59th Annual Symposium on Foundations of Computer Science (FOCS).
[16] Carsten Lund,et al. Proof verification and hardness of approximation problems , 1992, Proceedings., 33rd Annual Symposium on Foundations of Computer Science.
[17] Yuval Ishai,et al. On the Local Leakage Resilience of Linear Secret Sharing Schemes , 2018, Journal of Cryptology.
[18] Eli Ben-Sasson,et al. Robust PCPs of Proximity, Shorter PCPs, and Applications to Coding , 2004, SIAM J. Comput..
[19] Yuval Ishai,et al. On Efficient Zero-Knowledge PCPs , 2012, TCC.
[20] Adi Shamir,et al. How to share a secret , 1979, CACM.
[21] Rafail Ostrovsky,et al. Zero-Knowledge Proofs from Secure Multiparty Computation , 2009, SIAM J. Comput..
[22] Thilo Mie,et al. Short PCPPs verifiable in polylogarithmic time with O(1) queries , 2009, Annals of Mathematics and Artificial Intelligence.
[23] Yuval Ishai,et al. Zero Knowledge LTCs and Their Applications , 2013, APPROX-RANDOM.
[24] Avi Wigderson,et al. Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation (Extended Abstract) , 1988, STOC.
[25] Vipul Goyal,et al. Non-malleable secret sharing , 2018, IACR Cryptol. ePrint Arch..
[26] Prashant Nalini Vasudevan,et al. Leakage Resilient Secret Sharing and Applications , 2019, IACR Cryptol. ePrint Arch..
[27] Silvio Micali,et al. The knowledge complexity of interactive proof-systems , 1985, STOC '85.
[28] Yuval Ishai,et al. Probabilistically Checkable Proofs of Proximity with Zero-Knowledge , 2014, TCC.
[29] Irit Dinur,et al. The PCP theorem by gap amplification , 2006, STOC.
[30] Omer Reingold,et al. Assignment testers: towards a combinatorial proof of the PCP-theorem , 2004, 45th Annual IEEE Symposium on Foundations of Computer Science.
[31] Guang Yang,et al. Making the Best of a Leaky Situation: Zero-Knowledge PCPs from Leakage-Resilient Circuits , 2016, TCC.
[32] Rafail Ostrovsky,et al. Zero-knowledge from secure multiparty computation , 2007, STOC '07.