Homomorphic Time-Lock Puzzles and Applications
暂无分享,去创建一个
[1] Dan Boneh,et al. Verifiable Delay Functions , 2018, IACR Cryptol. ePrint Arch..
[2] David Pointcheval,et al. Encryption Switching Protocols , 2015, CRYPTO.
[3] Ronald L. Rivest,et al. Time-lock Puzzles and Timed-release Crypto , 1996 .
[4] Silvio Micali,et al. Probabilistic encryption & how to play mental poker keeping secret all partial information , 1982, STOC '82.
[5] Moni Naor,et al. Timed Commitments , 2000, CRYPTO.
[6] Johannes A. Buchmann,et al. A key-exchange system based on imaginary quadratic fields , 1988, Journal of Cryptology.
[7] Nir Bitansky,et al. Time-Lock Puzzles from Randomized Encodings , 2016, IACR Cryptol. ePrint Arch..
[8] Krzysztof Pietrzak,et al. Simple Verifiable Delay Functions , 2018, IACR Cryptol. ePrint Arch..
[9] Anat Paskin-Cherniavsky,et al. Maliciously Circuit-Private FHE , 2014, CRYPTO.
[10] Rafael Pass,et al. Two-Round and Non-Interactive Concurrent Non-Malleable Commitments from Time-Lock Puzzles , 2017, 2017 IEEE 58th Annual Symposium on Foundations of Computer Science (FOCS).
[11] Craig Gentry,et al. i-Hop Homomorphic Encryption and Rerandomizable Yao Circuits , 2010, IACR Cryptol. ePrint Arch..
[12] Aggelos Kiayias,et al. Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol , 2017, CRYPTO.
[13] Manuel Blum,et al. How to Generate Cryptographically Strong Sequences of Pseudo Random Bits , 1982, FOCS.
[14] Manuel Blum,et al. How to generate cryptographically strong sequences of pseudo random bits , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).
[15] Tibor Jager,et al. How to build time-lock encryption , 2018, Designs, Codes and Cryptography.
[16] Silvio Micali,et al. How to Construct Random Functions (Extended Abstract) , 1984, FOCS.
[17] Ivan Damgård,et al. A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System , 2001, Public Key Cryptography.
[18] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[19] Craig Gentry,et al. Succinct Randomized Encodings and their Applications. , 2014 .
[20] Brent Waters,et al. Synchronized Aggregate Signatures from the RSA Assumption , 2018, IACR Cryptol. ePrint Arch..
[21] Adi Shamir,et al. Multiple non-interactive zero knowledge proofs based on a single random string , 1990, Proceedings [1990] 31st Annual Symposium on Foundations of Computer Science.
[22] Benjamin Wesolowski,et al. Efficient Verifiable Delay Functions , 2019, Journal of Cryptology.
[23] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[24] Zvika Brakerski,et al. Circular and Leakage Resilient Public-Key Encryption Under Subgroup Indistinguishability (or: Quadratic Residuosity Strikes Back) , 2010, IACR Cryptol. ePrint Arch..
[25] Moni Naor,et al. Zaps and their applications , 2000, Proceedings 41st Annual Symposium on Foundations of Computer Science.
[26] Brent Waters,et al. Witness encryption and its applications , 2013, STOC '13.
[27] Dan Boneh,et al. A Survey of Two Verifiable Delay Functions , 2018, IACR Cryptol. ePrint Arch..
[28] S. Vadhan,et al. Time-Lock Puzzles in the Random Oracle , 2011 .
[29] Ran Canetti,et al. Obfuscation of Probabilistic Circuits and Applications , 2015, TCC.
[30] Anat Paskin-Cherniavsky,et al. Evaluating Branching Programs on Encrypted Data , 2007, TCC.
[31] Salil P. Vadhan,et al. Publicly verifiable proofs of sequential work , 2013, ITCS '13.