The contributions detailed in this thesis focus on the design and the analysis of Succinct non-interactive arguments of knowledge, known as SNARKs. SNARKs enable a party with large computational resources to prove to a weaker party that a particular statement is true in an efficient way without further interaction and under a minimal communication requirement. Our results deal with three different aspects of SNARK protocols: the post-quantum security of SNARKs, the composability of SNARKs with other cryptographic primitives and the confidentiality of the inputs in the computations verified by SNARKS. FIrst, we propose a new framework that allows the instantiation of a quantum-resilient SNARK scheme from lattice assumptions. We also study th...
A zk-SNARK is a protocol that lets one party, the prover, prove to another party, the verifier, that...
Subversion zero knowledge for non-interactive proof systems demands that zero knowledge (ZK) be main...
SNARK is a well-known family of cryptographic tools that is increasingly used in the field of comput...
Cette thèse est consacrée à une exploration des schémas de preuve de connaissance succincts, les SNA...
International audienceZero-knowledge SNARKs (zk-SNARKs) are non-interactive proof systems with short...
The past several years have seen tremendous advances in practical, general-purpose, non-interactive ...
The existence of succinct non-interactive arguments for NP (i.e., non-interactive computationally-so...
Succinct non-interactive arguments of knowledge (SNARKs) are cryptographic proofs with strong effici...
Succinct non-interactive arguments (snarks) are cryptographic constructions that allow a prover to ...
This thesis studies non-interactive arguments of knowledge, a cryptographic primitive that allows a ...
Succinct non-interactive arguments of knowledge (SNARKs) are cryptographic proofs with strong effici...
International audienceSubversion zero knowledge for non-interactive proof systems demands that zero ...
zk-SNARK is a cryptographic protocol, which enables transformation of an arbitrary computation into ...
Zero-knowledge succinct non-interactive arguments of knowledge (zk-SNARKs) have emerged as a valuabl...
The existence of non-interactive succinct arguments (namely, non-interactive computationally-sound p...
A zk-SNARK is a protocol that lets one party, the prover, prove to another party, the verifier, that...
Subversion zero knowledge for non-interactive proof systems demands that zero knowledge (ZK) be main...
SNARK is a well-known family of cryptographic tools that is increasingly used in the field of comput...
Cette thèse est consacrée à une exploration des schémas de preuve de connaissance succincts, les SNA...
International audienceZero-knowledge SNARKs (zk-SNARKs) are non-interactive proof systems with short...
The past several years have seen tremendous advances in practical, general-purpose, non-interactive ...
The existence of succinct non-interactive arguments for NP (i.e., non-interactive computationally-so...
Succinct non-interactive arguments of knowledge (SNARKs) are cryptographic proofs with strong effici...
Succinct non-interactive arguments (snarks) are cryptographic constructions that allow a prover to ...
This thesis studies non-interactive arguments of knowledge, a cryptographic primitive that allows a ...
Succinct non-interactive arguments of knowledge (SNARKs) are cryptographic proofs with strong effici...
International audienceSubversion zero knowledge for non-interactive proof systems demands that zero ...
zk-SNARK is a cryptographic protocol, which enables transformation of an arbitrary computation into ...
Zero-knowledge succinct non-interactive arguments of knowledge (zk-SNARKs) have emerged as a valuabl...
The existence of non-interactive succinct arguments (namely, non-interactive computationally-sound p...
A zk-SNARK is a protocol that lets one party, the prover, prove to another party, the verifier, that...
Subversion zero knowledge for non-interactive proof systems demands that zero knowledge (ZK) be main...
SNARK is a well-known family of cryptographic tools that is increasingly used in the field of comput...