A proof of exponentiation (PoE) in a group G of unknown order allows a prover to convince a verifier that a tuple (x,q,T,y)∈G×N×N×G satisfies xqT=y. This primitive has recently found exciting applications in the constructions of verifiable delay functions and succinct arguments of knowledge. The most practical PoEs only achieve soundness either under computational assumptions, i.e., they are arguments (Wesolowski, Journal of Cryptology 2020), or in groups that come with the promise of not having any small subgroups (Pietrzak, ITCS 2019). The only statistically-sound PoE in general groups of unknown order is due to Block et al. (CRYPTO 2021), and can be seen as an elaborate parallel repetition of Pietrzak’s PoE: to achieve λ bits of security...
Given a corrupted word w = (w1,..., wn) from a Reed-Solomon code of distance d, there are many ways ...
A subgroup G_q, of prime order q, for which the discrete logarithm problem is assumed hard is mostl...
Part 1: Invited PapersInternational audienceCryptographic operations are performed everywhere, from ...
A proof of exponentiation (PoE) in a group G of unknown order allows a prover to convince a verifier...
Many public-key cryptosystems and, more generally, cryptographic protocols, use group exponentiation...
In this short note, we show that substantially weaker Low Order assumptions are sufficient to prove ...
In this lecture, we discuss exponentiation and several exponentiation algorithms. We also give a bri...
Many public-key cryptosystems and, more generally, cryptographic protocols, use group exponentiation...
We present protocols for speeding up fixed-base exponentiation and variable-base exponentiation usin...
International audienceWe address the problem of speeding up group computations in cryptography using...
We present an efficient proof scheme for any instance of left-to-right modular exponentiation, used ...
Abstract. For many one-way homomorphisms used in cryptography, there exist efficient zeroknowledge p...
As the core operation of many public key cryptosystems, group exponentiation is central to cryptogra...
International audiencePublic-key cryptographic primitives are time-consuming for resource-constraine...
We initiate the study of a novel class of group-theoretic intractability problems. Inspired by the t...
Given a corrupted word w = (w1,..., wn) from a Reed-Solomon code of distance d, there are many ways ...
A subgroup G_q, of prime order q, for which the discrete logarithm problem is assumed hard is mostl...
Part 1: Invited PapersInternational audienceCryptographic operations are performed everywhere, from ...
A proof of exponentiation (PoE) in a group G of unknown order allows a prover to convince a verifier...
Many public-key cryptosystems and, more generally, cryptographic protocols, use group exponentiation...
In this short note, we show that substantially weaker Low Order assumptions are sufficient to prove ...
In this lecture, we discuss exponentiation and several exponentiation algorithms. We also give a bri...
Many public-key cryptosystems and, more generally, cryptographic protocols, use group exponentiation...
We present protocols for speeding up fixed-base exponentiation and variable-base exponentiation usin...
International audienceWe address the problem of speeding up group computations in cryptography using...
We present an efficient proof scheme for any instance of left-to-right modular exponentiation, used ...
Abstract. For many one-way homomorphisms used in cryptography, there exist efficient zeroknowledge p...
As the core operation of many public key cryptosystems, group exponentiation is central to cryptogra...
International audiencePublic-key cryptographic primitives are time-consuming for resource-constraine...
We initiate the study of a novel class of group-theoretic intractability problems. Inspired by the t...
Given a corrupted word w = (w1,..., wn) from a Reed-Solomon code of distance d, there are many ways ...
A subgroup G_q, of prime order q, for which the discrete logarithm problem is assumed hard is mostl...
Part 1: Invited PapersInternational audienceCryptographic operations are performed everywhere, from ...