IACR

Results: 2241



#Item
1

Doubly-efficient zkSNARKs without trusted setup Riad S. Wahby⋆ Ioanna Tzialla◦ abhi shelat†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2018-04-19 12:23:03
    2Cryptography / Mathematics / Number theory / Post-quantum cryptography / Spectral theory / Algebra / Distribution / Pseudorandom function family / Learning with errors / Jordan normal form / Decomposition of spectrum

    A Bit-fixing PRF with O(1) Collusion-Resistance from LWE Alex Davidson1,? and Ryo Nishimaki2 1 2

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2018-10-18 18:40:38
    3Cryptography / Artificial intelligence / Human-based computation / Computing / Cryptocurrencies / CAPTCHA / Computer security / Computer vision / Proof-of-work system / Hashcash / Challengeresponse authentication / Zero-knowledge proof

    Designing Proof of Human-work Puzzles for Cryptocurrency and Beyond∗ Jeremiah Blocki Purdue University, Hong-Sheng Zhou Virginia Commonwealth University,

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2016-08-24 14:55:21
    4Cryptography / Public-key cryptography / Elliptic curve cryptography / Digital Signature Standard / Key management / Elliptic Curve Digital Signature Algorithm / Digital signature / Digital Signature Algorithm / EdDSA / Key / Domain Name System Security Extensions / Homomorphic encryption

    Short Double- and N -Times-Authentication-Preventing Signatures from ECDSA and More David Derler1 , Sebastian Ramacher1 , and Daniel Slamanig2 1

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2018-02-28 05:05:12
    5Algebra / Mathematics / Multilinear algebra / Non-interactive zero-knowledge proof / Proof theory / IP / Snark / Zero-knowledge proof / Zero knowledge / Soundness / Bilinear map / Model theory

    On the Size of Pairing-based Non-interactive Arguments? Jens Groth?? University College London, UK Abstract. Non-interactive arguments enable a prover to convince a verifier that a statement is true. R

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2016-05-31 08:55:32
    6Cryptography / Computer security / Trusted computing / Cryptographic software / Direct Anonymous Attestation / Trusted Platform Module / Digital signature / Secure multi-party computation / Universal composability / Privacy

    Anonymous Attestation with Subverted TPMs ? Jan Camenisch1 , Manu Drijvers1,2 , and Anja Lehmann1 1

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2017-06-28 10:54:34
    7Complexity classes / Cryptography / Computational complexity theory / Computing / Interactive proof system / Zero-knowledge proof / NP / IP / Soundness / Proof of secure erasure / Certificate / Zero knowledge

    Zero-Knowledge Protocols for Search Problems Ben Berger Zvika Brakerski Weizmann Institute of Science, Israel∗ Abstract

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2018-05-14 10:13:17
    8Cryptography / Ciphertext indistinguishability / IP / Semantic security / Advantage / Constructible universe / Homomorphic encryption / Probabilistically checkable proof

    Succinct Spooky Free Compilers Are Not Black Box Sound Zvika Brakerski∗ Yael Kalai† Renen Perlman‡

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2017-11-17 09:33:06
    9Cryptography / National Institute of Standards and Technology / Block cipher / Advantage / Random number generation / RSA / Pseudorandom number generators / Dual EC DRBG

    Security Bounds for the NIST Codebook-based Deterministic Random Bit Generator Matthew J. Campagna Secure Systems Pitney Bowes Inc.

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2006-11-01 07:43:52
    10Cryptography / Public-key cryptography / Proxy re-encryption / ID-based encryption / Homomorphic encryption / ElGamal encryption / Chosen-ciphertext attack / Encryption / RSA / Key / Symmetric-key algorithm / Identity-based conditional proxy re-encryption

    Revisiting Proxy Re-Encryption: Forward Secrecy, Improved Security, and Applications David Derler1 , Stephan Krenn2 , Thomas Lor¨ unser2 , Sebastian Ramacher1 , 2 Daniel Slamanig , and Christoph Striecks2

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2018-05-03 11:03:06
    UPDATE