An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks

D He, S Zeadally, B Xu, X Huang - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
By broadcasting messages about traffic status to vehicles wirelessly, a vehicular ad hoc
network (VANET) can improve traffic safety and efficiency. To guarantee secure …

Fractal: Post-quantum and Transparent Recursive Proofs from Holography

A Chiesa, D Ojha, N Spooner - … on the Theory and Applications of …, 2020 - Springer
We present a new methodology to efficiently realize recursive composition of succinct non-
interactive arguments of knowledge (SNARKs). Prior to this work, the only known …

Recursive proof composition without a trusted setup

S Bowe, J Grigg, D Hopwood - Cryptology ePrint Archive, 2019 - eprint.iacr.org
Non-interactive arguments of knowledge are powerful cryptographic tools that can be used
to demonstrate the faithful execution of arbitrary computations with publicly verifiable proofs …

Zexe: Enabling decentralized private computation

S Bowe, A Chiesa, M Green, I Miers… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
Ledger-based systems that support rich applications often suffer from two limitations. First,
validating a transaction requires re-executing the state transition that it attests to. Second …

SNARKs for C: Verifying program executions succinctly and in zero knowledge

E Ben-Sasson, A Chiesa, D Genkin, E Tromer… - Annual cryptology …, 2013 - Springer
An argument system for NP is a proof system that allows efficient verification of NP
statements, given proofs produced by an untrusted yet computationally-bounded prover …

Fully homomorphic encryption over the integers

M Van Dijk, C Gentry, S Halevi… - Advances in Cryptology …, 2010 - Springer
We construct a simple fully homomorphic encryption scheme, using only elementary
modular arithmetic. We use Gentry's technique to construct a fully homomorphic scheme …

Fuzzy identity-based data integrity auditing for reliable cloud storage systems

Y Li, Y Yu, G Min, W Susilo, J Ni… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Data integrity, a core security issue in reliable cloud storage, has received much attention.
Data auditing protocols enable a verifier to efficiently check the integrity of the outsourced …

[图书][B] Handbook of finite fields

GL Mullen, D Panario - 2013 - api.taylorfrancis.com
The CRC Handbook of Finite Fields (hereafter referred to as the Handbook) is a reference
book for the theory and applications of finite fields. It is not intended to be an introductory …

Updating key size estimations for pairings

R Barbulescu, S Duquesne - Journal of cryptology, 2019 - Springer
Recent progress on NFS imposed a new estimation of the security of pairings. In this work
we study the best attacks against some of the most popular pairings and propose new key …

Compact proofs of retrievability

H Shacham, B Waters - Journal of cryptology, 2013 - Springer
In a proof-of-retrievability system, a data storage center must prove to a verifier that he is
actually storing all of a client's data. The central challenge is to build systems that are both …