Succinct arguments allow a prover to convince a verifier of the validity of any statement in a language, with minimal communication and verifier\u27s work. Among other approaches, lattice-based protocols offer solid theoretical foundations, post-quantum security, and a rich algebraic structure. In this work, we present some new approaches to constructing efficient lattice-based succinct arguments. Our main technical ingredient is a new commitment scheme based on vanishing polynomials, a notion borrowed from algebraic geometry. We analyse the security of such a commitment scheme, and show how to take advantage of the additional algebraic structure to build new lattice-based succinct arguments. A few highlights amongst our results are: -...
We present a framework for building practical anonymous credential schemes based on the hardness of ...
Digital signature is an essential primitive in cryptography, which can be used as the digital analog...
Privacy and control over data have become a public concern. Simultaneously, the increasing likelihoo...
Recent works on lattice-based extractable polynomial commitments can be grouped into two classes: (i...
Succinct non-interactive arguments (SNARGs) enable verifying NP computations with substantially lowe...
A functional commitment allows a user to commit to an input $\mathbf{x} \in \{0,1\}^\ell$ and later ...
There has been a lot of recent progress in constructing efficient zero-knowledge proofs for showing ...
International audienceZero-knowledge SNARKs (zk-SNARKs) are non-interactive proof systems with short...
Vector commitment schemes allow a user to commit to a vector of values $\mathbf{x} \in \{0,1\}^\ell$...
Interactive Oracle Proof of Proximity (IOPPs) are a powerful tool for constructing succinct non-inte...
One essential quest in cryptography is the search for hard instances of a given computational proble...
Today\u27s most compact zero-knowledge arguments are based on the hardness of the discrete logarithm...
Building cryptographic schemes upon as many fundamentally different hard problems as possible, seems...
Lattice-based cryptography began with the seminal work of Ajtai (Ajtai '96) who showed that it is po...
Higher-level cryptographic privacy-enhancing protocols such as anonymous credentials, voting schemes...
We present a framework for building practical anonymous credential schemes based on the hardness of ...
Digital signature is an essential primitive in cryptography, which can be used as the digital analog...
Privacy and control over data have become a public concern. Simultaneously, the increasing likelihoo...
Recent works on lattice-based extractable polynomial commitments can be grouped into two classes: (i...
Succinct non-interactive arguments (SNARGs) enable verifying NP computations with substantially lowe...
A functional commitment allows a user to commit to an input $\mathbf{x} \in \{0,1\}^\ell$ and later ...
There has been a lot of recent progress in constructing efficient zero-knowledge proofs for showing ...
International audienceZero-knowledge SNARKs (zk-SNARKs) are non-interactive proof systems with short...
Vector commitment schemes allow a user to commit to a vector of values $\mathbf{x} \in \{0,1\}^\ell$...
Interactive Oracle Proof of Proximity (IOPPs) are a powerful tool for constructing succinct non-inte...
One essential quest in cryptography is the search for hard instances of a given computational proble...
Today\u27s most compact zero-knowledge arguments are based on the hardness of the discrete logarithm...
Building cryptographic schemes upon as many fundamentally different hard problems as possible, seems...
Lattice-based cryptography began with the seminal work of Ajtai (Ajtai '96) who showed that it is po...
Higher-level cryptographic privacy-enhancing protocols such as anonymous credentials, voting schemes...
We present a framework for building practical anonymous credential schemes based on the hardness of ...
Digital signature is an essential primitive in cryptography, which can be used as the digital analog...
Privacy and control over data have become a public concern. Simultaneously, the increasing likelihoo...