The Fiat-Shamir transform is a well studied paradigm for removing interaction from public-coin protocols. We investigate whether the resulting non-interactive zero-knowledge (NIZK) proof systems also exhibit non-malleability properties that have up to now only been studied for NIZK proof systems in the common reference string model: first, we formally define simulation soundness and a weak form of simulation extraction in the random oracle model (ROM). Second, we show that in the ROM the Fiat-Shamir transform meets these properties under lenient conditions. A consequence of our result is that, in the ROM, we obtain truly efficient non malleable NIZK proof systems essentially for free. Our definitions are sufficient for instantiating the Na...
The standard model security of the Fiat-Shamir transform has been an active research area for many y...
The Fiat-Shamir transform is a technique for combining a hash function and an identification scheme ...
International audienceVerifiability is central to building protocols and systems with integrity. Ini...
peer reviewedThe Fiat-Shamir (FS) transform is a well known and widely used technique to convert any...
Non-interactive zero-knowledge (NIZK) arguments allow a prover to convince a verifier about the trut...
The Fiat-Shamir (FS) transform uses a hash function to generate, without any further overhead, non-i...
The Fiat–Shamir (FS) transformation (Fiat and Shamir, Crypto ‘86) is a popular paradigm for construc...
The Fiat-Shamir paradigm [CRYPTO\u2786] is a heuristic for converting 3-round identification schemes...
In STOC 2019 Canetti et al. showed how to soundly instantiate the Fiat-Shamir transform assuming tha...
International audienceThe Naor-Yung paradigm is a well-known technique that constructs IND-CCA2-secu...
Non-interactive zero-knowledge (NIZK) proof systems are a cornerstone of modern cryptography, but th...
The Fiat-Shamir transform is a classical technique for turning any zero-knowledge $\Sigma$-protocol ...
International audienceThe standard model security of the Fiat-Shamir transform has been an active re...
The Fiat-Shamir transform is a general method for reducing interaction in public-coin protocols by r...
The Fiat–Shamir (FS) transformation (Fiat and Shamir, Crypto '86) is a popular paradigm for construc...
The standard model security of the Fiat-Shamir transform has been an active research area for many y...
The Fiat-Shamir transform is a technique for combining a hash function and an identification scheme ...
International audienceVerifiability is central to building protocols and systems with integrity. Ini...
peer reviewedThe Fiat-Shamir (FS) transform is a well known and widely used technique to convert any...
Non-interactive zero-knowledge (NIZK) arguments allow a prover to convince a verifier about the trut...
The Fiat-Shamir (FS) transform uses a hash function to generate, without any further overhead, non-i...
The Fiat–Shamir (FS) transformation (Fiat and Shamir, Crypto ‘86) is a popular paradigm for construc...
The Fiat-Shamir paradigm [CRYPTO\u2786] is a heuristic for converting 3-round identification schemes...
In STOC 2019 Canetti et al. showed how to soundly instantiate the Fiat-Shamir transform assuming tha...
International audienceThe Naor-Yung paradigm is a well-known technique that constructs IND-CCA2-secu...
Non-interactive zero-knowledge (NIZK) proof systems are a cornerstone of modern cryptography, but th...
The Fiat-Shamir transform is a classical technique for turning any zero-knowledge $\Sigma$-protocol ...
International audienceThe standard model security of the Fiat-Shamir transform has been an active re...
The Fiat-Shamir transform is a general method for reducing interaction in public-coin protocols by r...
The Fiat–Shamir (FS) transformation (Fiat and Shamir, Crypto '86) is a popular paradigm for construc...
The standard model security of the Fiat-Shamir transform has been an active research area for many y...
The Fiat-Shamir transform is a technique for combining a hash function and an identification scheme ...
International audienceVerifiability is central to building protocols and systems with integrity. Ini...