ZAPs and Non-Interactive Witness Indistinguishability from Indistinguishability Obfuscation
暂无分享,去创建一个
[1] Jean-Sébastien Coron,et al. Practical Multilinear Maps over the Integers , 2013, CRYPTO.
[2] Silvio Micali,et al. How to construct random functions , 1986, JACM.
[3] Guy N. Rothblum,et al. Weak Verifiable Random Functions , 2009, TCC.
[4] Oded Goldreich,et al. Definitions and properties of zero-knowledge proof systems , 1994, Journal of Cryptology.
[5] Hongda Li,et al. One-Round Witness Indistinguishability from Indistinguishability Obfuscation , 2014, ISPEC.
[6] Adi Shamir,et al. Multiple NonInteractive Zero Knowledge Proofs Under General Assumptions , 1999, SIAM J. Comput..
[7] Moti Yung,et al. Certifying Permutations: Noninteractive zero-knowledge based on any trapdoor permutation , 1996, Journal of Cryptology.
[8] Moni Naor,et al. Zaps and their applications , 2000, Proceedings 41st Annual Symposium on Foundations of Computer Science.
[9] Rafail Ostrovsky,et al. Invariant Signatures and Non-Interactive Zero-Knowledge Proofs are Equivalent (Extended Abstract) , 1992, CRYPTO.
[10] Yael Tauman Kalai,et al. Protecting Obfuscation against Algebraic Attacks , 2014, EUROCRYPT.
[11] Justin M. Reyneri,et al. Coin flipping by telephone , 1984, IEEE Trans. Inf. Theory.
[12] Manuel Blum,et al. Non-Interactive Zero-Knowledge and Its Applications (Extended Abstract) , 1988, STOC 1988.
[13] Silvio Micali,et al. Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems , 1991, JACM.
[14] Craig Gentry,et al. Candidate Multilinear Maps from Ideal Lattices , 2013, EUROCRYPT.
[15] Manuel Blum,et al. Non-interactive zero-knowledge and its applications , 1988, STOC '88.
[16] Moni Naor,et al. Bit commitment using pseudorandomness , 1989, Journal of Cryptology.
[17] Brent Waters,et al. How to use indistinguishability obfuscation: deniable encryption, and more , 2014, IACR Cryptol. ePrint Arch..
[18] Adi Shamir,et al. Zero Knowledge Proofs of Knowledge in Two Rounds , 1989, CRYPTO.
[19] Brent Waters,et al. Constrained Pseudorandom Functions and Their Applications , 2013, ASIACRYPT.
[20] Shafi Goldwasser,et al. Functional Signatures and Pseudorandom Functions , 2014, Public Key Cryptography.
[21] Leonid A. Levin,et al. A hard-core predicate for all one-way functions , 1989, STOC '89.
[22] Salil P. Vadhan,et al. Derandomization in Cryptography , 2003, SIAM J. Comput..
[23] Amit Sahai,et al. On the (im)possibility of obfuscating programs , 2001, JACM.
[24] Craig Gentry,et al. Two-Round Secure MPC from Indistinguishability Obfuscation , 2014, TCC.
[25] Aggelos Kiayias,et al. Delegatable pseudorandom functions and applications , 2013, IACR Cryptol. ePrint Arch..
[26] Craig Gentry,et al. Graph-Induced Multilinear Maps from Lattices , 2015, TCC.
[27] Brent Waters,et al. Candidate Indistinguishability Obfuscation and Functional Encryption for all Circuits , 2013, 2013 IEEE 54th Annual Symposium on Foundations of Computer Science.
[28] Rafail Ostrovsky,et al. New Techniques for Noninteractive Zero-Knowledge , 2012, JACM.
[29] Silvio Micali,et al. The knowledge complexity of interactive proof-systems , 1985, STOC '85.
[30] Brent Waters,et al. Witness encryption and its applications , 2013, STOC '13.
[31] Moni Naor,et al. One-Way Functions and (Im)Perfect Obfuscation , 2014, 2014 IEEE 55th Annual Symposium on Foundations of Computer Science.
[32] Guy N. Rothblum,et al. Virtual Black-Box Obfuscation for All Circuits via Generic Graded Encoding , 2014, TCC.