We show a lattice-based solution for commit-and-prove transparent circuit zero-knowledge (ZK) with polylog-communication, the first not depending on PCPs. We start from compressed Σ -protocol theory (CRYPTO 2020), which is built around basic Σ -protocols for opening an arbitrary linear form on a long secret vector that is compactly committed to. These protocols are first compressed using a recursive “folding-technique” adapted from Bulletproofs, at the expense of logarithmic rounds. Proving in ZK that the secret vector satisfies a given constraint – captured by a circuit – is then by (blackbox) reduction to the linear case, via arithmetic secret-sharing techniques adapted from MPC. Commit-and-prove is also facilitated, i.e., when commitment...
We propose the first zero-knowledge argument with sub-linear communication complexity for arithmetic...
We construct a perfectly binding string commitment scheme whose security is based on the learning pa...
We construct a perfectly binding string commitment scheme whose security is based on the learning pa...
Σ-Protocols provide a well-understood basis for secure algorithmics. Recently, Bulletproofs (Bootle ...
Compressed Σ-Protocol Theory (CRYPTO 2020) presents an “alternative” to Bulletproofs that achieves t...
Recently, there has been a great development in communication-efficient zero-knowledge (ZK) protocol...
In an (honest-verifier) zero-knowledge proof of partial knowledge, introduced by Cramer, Damgård and...
In an (honest-verifier) zero-knowledge proof of partial knowledge, introduced by Cramer, Damgård and...
Lai et al. (CCS 2019) have shown how Bulletproof’s arithmetic circuit zero-knowledge protocol (Bootl...
We present efficient Zero-Knowledge Proofs of Knowledge (ZKPoK) for linear and multiplicative relati...
We study secret sharing schemes for general (non-threshold) access structures. A general secret shar...
We propose a general technique that allows improving the complexity of zero-knowledge protocols for ...
Zero-knowledge (ZK) protocols are undoubtedly among the central primitives in cryptography, lending ...
There has been a lot of recent progress in constructing efficient zero-knowledge proofs for showing ...
Abstract. We propose a general technique that allows improving the complexity of zero-knowledge prot...
We propose the first zero-knowledge argument with sub-linear communication complexity for arithmetic...
We construct a perfectly binding string commitment scheme whose security is based on the learning pa...
We construct a perfectly binding string commitment scheme whose security is based on the learning pa...
Σ-Protocols provide a well-understood basis for secure algorithmics. Recently, Bulletproofs (Bootle ...
Compressed Σ-Protocol Theory (CRYPTO 2020) presents an “alternative” to Bulletproofs that achieves t...
Recently, there has been a great development in communication-efficient zero-knowledge (ZK) protocol...
In an (honest-verifier) zero-knowledge proof of partial knowledge, introduced by Cramer, Damgård and...
In an (honest-verifier) zero-knowledge proof of partial knowledge, introduced by Cramer, Damgård and...
Lai et al. (CCS 2019) have shown how Bulletproof’s arithmetic circuit zero-knowledge protocol (Bootl...
We present efficient Zero-Knowledge Proofs of Knowledge (ZKPoK) for linear and multiplicative relati...
We study secret sharing schemes for general (non-threshold) access structures. A general secret shar...
We propose a general technique that allows improving the complexity of zero-knowledge protocols for ...
Zero-knowledge (ZK) protocols are undoubtedly among the central primitives in cryptography, lending ...
There has been a lot of recent progress in constructing efficient zero-knowledge proofs for showing ...
Abstract. We propose a general technique that allows improving the complexity of zero-knowledge prot...
We propose the first zero-knowledge argument with sub-linear communication complexity for arithmetic...
We construct a perfectly binding string commitment scheme whose security is based on the learning pa...
We construct a perfectly binding string commitment scheme whose security is based on the learning pa...