$\Sigma$-protocols are a widely utilized, relatively simple and well understood type of zero-knowledge proofs. However, the well known Schnorr $\Sigma$-protocol for proving knowledge of discrete logarithm in a cyclic group of known prime order, and similar protocols working over this type of groups, are hard to generalize to dealing with other groups. In particular with hidden order groups, due to the inability of the knowledge extractor to invert elements modulo the order. In this paper, we introduce a universal construction of $\Sigma$-protocols designed to prove knowledge of preimages of group homomorphisms for any abelian finite group. In order to do this, we first establish a general construction of a $\Sigma$-protocol for $\mathfrak{...
Abstract. We propose a general technique that allows improving the complexity of zero-knowledge prot...
ISBN : 978-0-8218-4037-5International audienceThe purpose of the paper is to give new key agreement ...
Isogeny computations in CSIDH (Asiacrypt 2018) are described using a commutative group G acting on t...
Sigma protocols are one of the most common and efficient zero-knowledge proofs (ZKPs). Over the dec...
International audienceZero-knowledge proofs have a vast applicability in the domain of cryptography,...
We propose a general technique that allows improving the complexity of zero-knowledge protocols for ...
We propose a new zero-knowledge protocol for proving knowledge of short preimages under additively h...
A black-box secret sharing scheme for the threshold access structure T_t,n is one which works over...
Σ-Protocols provide a well-understood basis for secure algorithmics. Recently, Bulletproofs (Bootle ...
A simple zero-knowledge proof of knowledge protocol is presented of which many known protocols are i...
In a proof of partial knowledge, introduced by Cramer, Damgård and Schoenmakers (CRYPTO 1994), a pro...
Abstract. For many one-way homomorphisms used in cryptography, there exist efficient zeroknowledge p...
$\Sigma$-protocols, a class of interactive two-party protocols, which are used as a framework to ins...
Zero-knowledge proofs provide a means for a prover to convince a verifier that some claim is true an...
This habilitation thesis deals with cryptographic primitives that preserve the algebraic structure o...
Abstract. We propose a general technique that allows improving the complexity of zero-knowledge prot...
ISBN : 978-0-8218-4037-5International audienceThe purpose of the paper is to give new key agreement ...
Isogeny computations in CSIDH (Asiacrypt 2018) are described using a commutative group G acting on t...
Sigma protocols are one of the most common and efficient zero-knowledge proofs (ZKPs). Over the dec...
International audienceZero-knowledge proofs have a vast applicability in the domain of cryptography,...
We propose a general technique that allows improving the complexity of zero-knowledge protocols for ...
We propose a new zero-knowledge protocol for proving knowledge of short preimages under additively h...
A black-box secret sharing scheme for the threshold access structure T_t,n is one which works over...
Σ-Protocols provide a well-understood basis for secure algorithmics. Recently, Bulletproofs (Bootle ...
A simple zero-knowledge proof of knowledge protocol is presented of which many known protocols are i...
In a proof of partial knowledge, introduced by Cramer, Damgård and Schoenmakers (CRYPTO 1994), a pro...
Abstract. For many one-way homomorphisms used in cryptography, there exist efficient zeroknowledge p...
$\Sigma$-protocols, a class of interactive two-party protocols, which are used as a framework to ins...
Zero-knowledge proofs provide a means for a prover to convince a verifier that some claim is true an...
This habilitation thesis deals with cryptographic primitives that preserve the algebraic structure o...
Abstract. We propose a general technique that allows improving the complexity of zero-knowledge prot...
ISBN : 978-0-8218-4037-5International audienceThe purpose of the paper is to give new key agreement ...
Isogeny computations in CSIDH (Asiacrypt 2018) are described using a commutative group G acting on t...