The intuitions behind succinct proof systems are often difficult to separate from some of the deep cryptographic techniques that are used in their construction. In this paper, we show that, using some simple abstractions, a number of commonly-used tools used in the construction of succinct proof systems may be viewed as basic consequences of linear algebra over finite fields. We introduce notation which considerably simplifies these constructions and slowly build a toolkit of useful techniques that can be combined to create different protocols. We also show a simple \u27probabilistic calculus\u27 which specifies how to combine these tools and bounds on their resulting security. To show the power of these abstractions and toolkit, we give a ...
International audienceCertificates to a linear algebra computation are additional data structures fo...
Secure computation often benefits from the use of correlated randomness to achieve fast, non-cryptog...
This paper presents the first automatic technique for proving not only protocols but also primitives...
We examine new ways in which coding theory and cryptography continue to be composed together, and sh...
Probabilistic proof systems, such as probabilistically checkable proofs, interactive proofs, and zer...
A fundamental result dating to Ligero (Des. Codes Cryptogr. \u2723) establishes that each fixed line...
We present a new mechanized prover for secrecy properties of cryptographic protocols. In contrast to...
International audienceCode-based game-playing is a popular methodology for proving security of crypt...
The question of how to construct optimally efficient secure protocols is a central question in crypt...
Interactive Oracle Proof of Proximity (IOPPs) are a powerful tool for constructing succinct non-inte...
We study the complexity of securely evaluating an arithmetic circuit over a finite field $F$ in the ...
Minimizing the computational cost of the prover is a central goal in the area of succinct arguments....
Certificates to a linear algebra computation are additional data struc-tures for each output, which ...
This article extracts the elements of algebra that play a central role in the design of efficient pr...
In this work we present secure two-party protocols for various core problems in linear algebra. Our ...
International audienceCertificates to a linear algebra computation are additional data structures fo...
Secure computation often benefits from the use of correlated randomness to achieve fast, non-cryptog...
This paper presents the first automatic technique for proving not only protocols but also primitives...
We examine new ways in which coding theory and cryptography continue to be composed together, and sh...
Probabilistic proof systems, such as probabilistically checkable proofs, interactive proofs, and zer...
A fundamental result dating to Ligero (Des. Codes Cryptogr. \u2723) establishes that each fixed line...
We present a new mechanized prover for secrecy properties of cryptographic protocols. In contrast to...
International audienceCode-based game-playing is a popular methodology for proving security of crypt...
The question of how to construct optimally efficient secure protocols is a central question in crypt...
Interactive Oracle Proof of Proximity (IOPPs) are a powerful tool for constructing succinct non-inte...
We study the complexity of securely evaluating an arithmetic circuit over a finite field $F$ in the ...
Minimizing the computational cost of the prover is a central goal in the area of succinct arguments....
Certificates to a linear algebra computation are additional data struc-tures for each output, which ...
This article extracts the elements of algebra that play a central role in the design of efficient pr...
In this work we present secure two-party protocols for various core problems in linear algebra. Our ...
International audienceCertificates to a linear algebra computation are additional data structures fo...
Secure computation often benefits from the use of correlated randomness to achieve fast, non-cryptog...
This paper presents the first automatic technique for proving not only protocols but also primitives...