A proof of exponentiation (PoE) in a group G of unknown order allows a prover to convince a verifier that a tuple (x, q, T, y) ∈ G× N× N× G satisfies xqT=y. This primitive has recently found exciting applications in the constructions of verifiable delay functions and succinct arguments of knowledge. The most practical PoEs only achieve soundness either under computational assumptions, i.e., they are arguments (Wesolowski, Journal of Cryptology 2020), or in groups that come with the promise of not having any small subgroups (Pietrzak, ITCS 2019). The only statistically-sound PoE in general groups of unknown order is due to Block et al. (CRYPTO 2021), and can be seen as an elaborate parallel repetition of Pietrzak’s PoE: to achieve λ bits of ...
AbstractIn this paper, I will introduce a link between the volume of a finite abelian p-group in the...
We initiate the study of a novel class of group-theoretic intractability problems. Inspired by the t...
Part 1: Invited PapersInternational audienceCryptographic operations are performed everywhere, from ...
A proof of exponentiation (PoE) in a group G of unknown order allows a prover to convince a verifier...
Many public-key cryptosystems and, more generally, cryptographic protocols, use group exponentiation...
In this lecture, we discuss exponentiation and several exponentiation algorithms. We also give a bri...
In this short note, we show that substantially weaker Low Order assumptions are sufficient to prove ...
Many public-key cryptosystems and, more generally, cryptographic protocols, use group exponentiation...
Abstract. For many one-way homomorphisms used in cryptography, there exist efficient zeroknowledge p...
As the core operation of many public key cryptosystems, group exponentiation is central to cryptogra...
International audienceWe address the problem of speeding up group computations in cryptography using...
We present protocols for speeding up fixed-base exponentiation and variable-base exponentiation usin...
We present an efficient proof scheme for any instance of left-to-right modular exponentiation, used ...
International audiencePublic-key cryptographic primitives are time-consuming for resource-constraine...
. Let G be an arbitrary cyclic group with generator g and order jGj with known factorization. G cou...
AbstractIn this paper, I will introduce a link between the volume of a finite abelian p-group in the...
We initiate the study of a novel class of group-theoretic intractability problems. Inspired by the t...
Part 1: Invited PapersInternational audienceCryptographic operations are performed everywhere, from ...
A proof of exponentiation (PoE) in a group G of unknown order allows a prover to convince a verifier...
Many public-key cryptosystems and, more generally, cryptographic protocols, use group exponentiation...
In this lecture, we discuss exponentiation and several exponentiation algorithms. We also give a bri...
In this short note, we show that substantially weaker Low Order assumptions are sufficient to prove ...
Many public-key cryptosystems and, more generally, cryptographic protocols, use group exponentiation...
Abstract. For many one-way homomorphisms used in cryptography, there exist efficient zeroknowledge p...
As the core operation of many public key cryptosystems, group exponentiation is central to cryptogra...
International audienceWe address the problem of speeding up group computations in cryptography using...
We present protocols for speeding up fixed-base exponentiation and variable-base exponentiation usin...
We present an efficient proof scheme for any instance of left-to-right modular exponentiation, used ...
International audiencePublic-key cryptographic primitives are time-consuming for resource-constraine...
. Let G be an arbitrary cyclic group with generator g and order jGj with known factorization. G cou...
AbstractIn this paper, I will introduce a link between the volume of a finite abelian p-group in the...
We initiate the study of a novel class of group-theoretic intractability problems. Inspired by the t...
Part 1: Invited PapersInternational audienceCryptographic operations are performed everywhere, from ...