Abstract. A proof of a shuffle is a zero-knowledge proof that one list of ciphertexts is a permutation and re-encryption of another list of ciphertexts. We call a shuffle restricted if the permutation is chosen from a public subset of all permutations. In this paper, we introduce a general technique for constructing proofs of shuffles which restrict the permutation to a group that is characterized by a public polynomial. This generalizes previous work by Reiter and Wang Our approach also gives a new efficient proof of an unrestricted shuffle that we think is conceptually simpler and allow a simpler analysis than all previous proofs of shuffles
This paper provides the first verifiable shuffle specifically for fully homomorphic schemes. A verif...
We construct the most efficient known pairing-based NIZK shuffle argument. It consists of three suba...
Depending on the application, malleability in cryptography can be viewed as either a flaw or — espec...
A shuffle of a set of ciphertexts is a new set of ciphertexts with the same plaintexts in permuted o...
In this paper, we propose a zero-knowledge proof scheme of shuffle. Unlike the previous schemes [6, ...
In TCC 2007, Adida and Wikström proposed a novel approach to shuffle, called a public shuffle, in wh...
Abstract. We show how to obfuscate a secret shuffle of ciphertexts: shuffling becomes a public opera...
We suggest an honest verifier zero-knowledge argument for the correctness of a shuffle of homomorphi...
We show how to public-key obfuscate two commonly used shuffles: decryption shuffles which permute an...
We propose a variant of the Paillier cryptosystem that improves efficiency in encryption, re-encrypt...
Similar to verifiable shuffling (mixing), we consider the problem of verifiable rotating a given lis...
Abstract. Similar to verifiable shuffling (or, mixing), we consider the problem of verifiable rotati...
PAC learning of unrestricted regular languages is long known to be a difficult problem. The class of...
In this paper we present the first fully post-quantum proof of a shuffle for RLWE encryption schemes...
In modern cryptography, the problem of secure multiparty computation is about the cooperation betwee...
This paper provides the first verifiable shuffle specifically for fully homomorphic schemes. A verif...
We construct the most efficient known pairing-based NIZK shuffle argument. It consists of three suba...
Depending on the application, malleability in cryptography can be viewed as either a flaw or — espec...
A shuffle of a set of ciphertexts is a new set of ciphertexts with the same plaintexts in permuted o...
In this paper, we propose a zero-knowledge proof scheme of shuffle. Unlike the previous schemes [6, ...
In TCC 2007, Adida and Wikström proposed a novel approach to shuffle, called a public shuffle, in wh...
Abstract. We show how to obfuscate a secret shuffle of ciphertexts: shuffling becomes a public opera...
We suggest an honest verifier zero-knowledge argument for the correctness of a shuffle of homomorphi...
We show how to public-key obfuscate two commonly used shuffles: decryption shuffles which permute an...
We propose a variant of the Paillier cryptosystem that improves efficiency in encryption, re-encrypt...
Similar to verifiable shuffling (mixing), we consider the problem of verifiable rotating a given lis...
Abstract. Similar to verifiable shuffling (or, mixing), we consider the problem of verifiable rotati...
PAC learning of unrestricted regular languages is long known to be a difficult problem. The class of...
In this paper we present the first fully post-quantum proof of a shuffle for RLWE encryption schemes...
In modern cryptography, the problem of secure multiparty computation is about the cooperation betwee...
This paper provides the first verifiable shuffle specifically for fully homomorphic schemes. A verif...
We construct the most efficient known pairing-based NIZK shuffle argument. It consists of three suba...
Depending on the application, malleability in cryptography can be viewed as either a flaw or — espec...