International audienceBilinear pairings have been used in different cryptographic applications and demonstrated to be a key building block for a plethora of constructions. In particular, some Succinct Non-interactive ARguments of Knowledge (SNARKs) have very short proofs and very fast verification thanks to a multi-pairing computation. This succinctness makes pairing-based SNARKs suitable for proof recursion, that is proofs verifying other proofs. In this scenario one requires to express efficiently a multi-pairing computation as a SNARK arithmetic circuit. Other compelling applications such as verifying Boneh-Lynn-Shacham (BLS) signatures or Kate-Zaverucha-Goldberg (KZG) polynomial commitment opening in a SNARK fall into the same requireme...
This study reports on an implementation of cryptographic pairings in a general purpose computer alge...
Pairing-friendly curves with odd prime embedding degrees at the 128-bit security level, such as BW13...
A recent NFS attack against pairings made it necessary to increase the key sizes of the most popular...
International audienceBilinear pairings have been used in different cryptographic applications and d...
A proof system is a protocol where one party (called the prover) tries to convince another party (ca...
Non-interactive arguments enable a prover to convince a verifier that a statement is true. Recently ...
International audienceAt CANS'20, El Housni and Guillevic introduced a new 2-chain of pairing-friend...
International audienceA zero-knowledge proof is a method by which one can prove knowledge of general...
In 2010, Freeman, Scott, and Teske published a well-known taxonomy compiling the best known families...
This paper introduces Brakedown, the first built system that provides linear-time SNARKs for NP, mea...
The most powerful known primitive in public-key cryptography is undoubtedly elliptic curve pairings....
A recent area of interest in cryptography is recursive composition of proof systems. One of the appr...
AbstractMany research papers in pairing-based cryptography treat pairings as a “black box”. These pa...
The past several years have seen tremendous advances in practical, general-purpose, non-interactive ...
pairing implementation, high-security pairings, hyperelliptic curves, group law, Jacobian arithmetic...
This study reports on an implementation of cryptographic pairings in a general purpose computer alge...
Pairing-friendly curves with odd prime embedding degrees at the 128-bit security level, such as BW13...
A recent NFS attack against pairings made it necessary to increase the key sizes of the most popular...
International audienceBilinear pairings have been used in different cryptographic applications and d...
A proof system is a protocol where one party (called the prover) tries to convince another party (ca...
Non-interactive arguments enable a prover to convince a verifier that a statement is true. Recently ...
International audienceAt CANS'20, El Housni and Guillevic introduced a new 2-chain of pairing-friend...
International audienceA zero-knowledge proof is a method by which one can prove knowledge of general...
In 2010, Freeman, Scott, and Teske published a well-known taxonomy compiling the best known families...
This paper introduces Brakedown, the first built system that provides linear-time SNARKs for NP, mea...
The most powerful known primitive in public-key cryptography is undoubtedly elliptic curve pairings....
A recent area of interest in cryptography is recursive composition of proof systems. One of the appr...
AbstractMany research papers in pairing-based cryptography treat pairings as a “black box”. These pa...
The past several years have seen tremendous advances in practical, general-purpose, non-interactive ...
pairing implementation, high-security pairings, hyperelliptic curves, group law, Jacobian arithmetic...
This study reports on an implementation of cryptographic pairings in a general purpose computer alge...
Pairing-friendly curves with odd prime embedding degrees at the 128-bit security level, such as BW13...
A recent NFS attack against pairings made it necessary to increase the key sizes of the most popular...