Ligero: Lightweight sublinear arguments without a trusted setup

S Ames, C Hazay, Y Ishai… - Proceedings of the 2017 …, 2017 - dl.acm.org
We design and implement a simple zero-knowledge argument protocol for NP whose
communication complexity is proportional to the square-root of the verification circuit size …

Efficient pseudorandom correlation generators: Silent OT extension and more

E Boyle, G Couteau, N Gilboa, Y Ishai, L Kohl… - Advances in Cryptology …, 2019 - Springer
Secure multiparty computation (MPC) often relies on correlated randomness for better
efficiency and simplicity. This is particularly useful for MPC with no honest majority, where …

Design of personnel big data management system based on blockchain

J Chen, Z Lv, H Song - Future generation computer systems, 2019 - Elsevier
With the continuous development of information technology, enterprises, universities and
governments are constantly stepping up the construction of electronic personnel information …

Correlated pseudorandomness from expand-accumulate codes

E Boyle, G Couteau, N Gilboa, Y Ishai, L Kohl… - Annual International …, 2022 - Springer
A pseudorandom correlation generator (PCG) is a recent tool for securely generating useful
sources of correlated randomness, such as random oblivious transfers (OT) and vector …

Feistel structures for MPC, and more

MR Albrecht, L Grassi, L Perrin, S Ramacher… - … –ESORICS 2019: 24th …, 2019 - Springer
Efficient PRP/PRFs are instrumental to the design of cryptographic protocols. We investigate
the design of dedicated PRP/PRFs for three application areas-secure multiparty computation …

[PDF][PDF] Brakedown: Linear-time and post-quantum SNARKs for R1CS.

A Golovnev, J Lee, STV Setty, J Thaler… - IACR Cryptol. ePrint …, 2021 - iacr.steepath.eu
This paper introduces Brakedown, 1 the first built system that provides linear-time SNARKs
for NP, meaning the prover incurs O (N) finite field operations to prove the satisfiability of an …

Rasta: a cipher with low ANDdepth and few ANDs per bit

C Dobraunig, M Eichlseder, L Grassi… - Advances in Cryptology …, 2018 - Springer
Recent developments in multi party computation (MPC) and fully homomorphic encryption
(FHE) promoted the design and analysis of symmetric cryptographic schemes that minimize …

Quantum lightning never strikes the same state twice. or: quantum money from cryptographic assumptions

M Zhandry - Journal of Cryptology, 2021 - Springer
Public key quantum money can be seen as a version of the quantum no-cloning theorem
that holds even when the quantum states can be verified by the adversary. In this work, we …

Proving as fast as computing: succinct arguments with constant prover overhead

N Ron-Zewi, RD Rothblum - Proceedings of the 54th Annual ACM …, 2022 - dl.acm.org
Succinct arguments are proof systems that allow a powerful, but untrusted, prover to
convince a weak verifier that an input x belongs to a language L∈ NP, with communication …

Lossy cryptography from code-based assumptions

Q Dao, A Jain - Annual International Cryptology Conference, 2024 - Springer
Over the past few decades, we have seen a proliferation of advanced cryptographic
primitives with lossy or homomorphic properties built from various assumptions such as …