Zero-knowledge (ZK) protocols are undoubtedly among the central primitives in cryptography, lending their power to numerous applications such as secure computation, voting, auctions, and anonymous credentials to name a few. The study of efficient ZK protocols for non-algebraic statements has seen rapid progress in recent times, relying on secure computation techniques. The primary contribution of this work lies in constructing efficient UC-secure constant round ZK protocols from garbled circuits that are secure against adaptive corruptions, with communication linear in the size of the statement. We begin by showing that the practically efficient ZK protocol of Jawurek et al. (CCS 2013) is adaptively secure when the underlying oblivious tran...
With the recent emergence of efficient zero-knowledge (ZK) proofs for general circuits, while effici...
Adaptive security is a strong security notion that captures additional security threats that are not...
Σ-Protocols provide a well-understood basis for secure algorithmics. Recently, Bulletproofs (Bootle ...
Zero-knowledge (ZK) protocols are undoubtedly among the central primitives in cryptography, lending ...
Zero-knowledge protocols are one of the fundamental con-cepts in modern cryptography and have countl...
Abstract. In the setting of secure computation, a set of parties wish to securely compute some funct...
In the setting of secure computation, a set of parties wish to securely compute some function of the...
The notion of non-interactive zero-knowledge (NIZK) is of fundamental importance in cryptography. De...
Zero-knowledge protocols are one of the fundamental concepts in modern cryptography and have countle...
The question of how to construct optimally efficient secure protocols is a central question in crypt...
Abstract In the last few years garbled circuits (GC) have been elevated from being merely a com-pone...
The construction of zero-knowledge proofs can be greatly simplified if the protocol is only required...
We introduce the notion of Resettable Zero-Knowledge (rZK), a new security measure for cryptographic...
International audienceWe put forth a new framework for building pairing-based non-interactive zerokn...
A Probabilistically Checkable Proof (PCP) allows a randomized verifier, with oracle access to a purp...
With the recent emergence of efficient zero-knowledge (ZK) proofs for general circuits, while effici...
Adaptive security is a strong security notion that captures additional security threats that are not...
Σ-Protocols provide a well-understood basis for secure algorithmics. Recently, Bulletproofs (Bootle ...
Zero-knowledge (ZK) protocols are undoubtedly among the central primitives in cryptography, lending ...
Zero-knowledge protocols are one of the fundamental con-cepts in modern cryptography and have countl...
Abstract. In the setting of secure computation, a set of parties wish to securely compute some funct...
In the setting of secure computation, a set of parties wish to securely compute some function of the...
The notion of non-interactive zero-knowledge (NIZK) is of fundamental importance in cryptography. De...
Zero-knowledge protocols are one of the fundamental concepts in modern cryptography and have countle...
The question of how to construct optimally efficient secure protocols is a central question in crypt...
Abstract In the last few years garbled circuits (GC) have been elevated from being merely a com-pone...
The construction of zero-knowledge proofs can be greatly simplified if the protocol is only required...
We introduce the notion of Resettable Zero-Knowledge (rZK), a new security measure for cryptographic...
International audienceWe put forth a new framework for building pairing-based non-interactive zerokn...
A Probabilistically Checkable Proof (PCP) allows a randomized verifier, with oracle access to a purp...
With the recent emergence of efficient zero-knowledge (ZK) proofs for general circuits, while effici...
Adaptive security is a strong security notion that captures additional security threats that are not...
Σ-Protocols provide a well-understood basis for secure algorithmics. Recently, Bulletproofs (Bootle ...