Zobrazeno 1 - 10
of 15
pro vyhledávání: '"Mary Maller"'
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783031313707
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::2ee0774985903e6eb00ed3e29c5ac093
https://doi.org/10.1007/978-3-031-31371-4_18
https://doi.org/10.1007/978-3-031-31371-4_18
Autor:
Arantxa Zapico, Vitalik Buterin, Dmitry Khovratovich, Mary Maller, Anca Nitulescu, Mark Simkin
Publikováno v:
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security.
Publikováno v:
Proceedings on Privacy Enhancing Technologies, Vol 2020, Iss 4, Pp 297-320 (2020)
Token-curated registries (TCRs) are a mechanism by which a set of users are able to jointly curate a reputable list about real-world information. Entries in the registry may have any form, so this primitive has been proposed for use—and deployed—
Publikováno v:
Financial Cryptography and Data Security ISBN: 9783031182822
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e1c4a75dbb61ae2ba1427ea40bf69aba
https://doi.org/10.1007/978-3-031-18283-9_10
https://doi.org/10.1007/978-3-031-18283-9_10
Publikováno v:
Advances in Cryptology – CRYPTO 2022 ISBN: 9783031159848
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::35dc6e33bc55dc888bcbbfa7f8419a93
https://doi.org/10.1007/978-3-031-15985-5_18
https://doi.org/10.1007/978-3-031-15985-5_18
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030920777
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b3f4525c99c693f78972f2b8c7d1e318
https://doi.org/10.1007/978-3-030-92078-4_4
https://doi.org/10.1007/978-3-030-92078-4_4
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030778699
EUROCRYPT (1)
EUROCRYPT (1)
In this paper, we introduce a distributed key generation (DKG) protocol with aggregatable and publicly-verifiable transcripts. Compared with prior publicly-verifiable approaches, our DKG reduces the size of the final transcript and the time to verify
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::8fddd06f5c7e6dd4d647206b4751c6c6
https://doi.org/10.1007/978-3-030-77870-5_6
https://doi.org/10.1007/978-3-030-77870-5_6
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030920777
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::9f39ea635c1d3331fb1dbc5ba3ae0a31
https://doi.org/10.1007/978-3-030-92078-4_3
https://doi.org/10.1007/978-3-030-92078-4_3
Publikováno v:
Advances in Cryptology – EUROCRYPT 2020 ISBN: 9783030457204
EUROCRYPT (1)
EUROCRYPT (1)
We present a methodology to construct preprocessing zkSNARKs where the structured reference string (SRS) is universal and updatable. This exploits a novel use of holography [Babai et al., STOC 1991], where fast verification is achieved provided the s
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::1ad911144648c0ea34b3a73286504906
https://doi.org/10.1007/978-3-030-45721-1_26
https://doi.org/10.1007/978-3-030-45721-1_26
Publikováno v:
CCS
Maller, M, Bowe, S, Kohlweiss, M & Meiklejohn, S 2019, Sonic: Zero-Knowledge SNARKs from Linear-Size Universal and Updateable Structured Reference Strings . in Proceedings of the Conference on Computer and Communications Security (CCS'19) . Association for Computing Machinery (ACM), pp. 2111-2128, 26th ACM Conference on Computer and Communications Security, London, United Kingdom, 11/11/19 . https://doi.org/10.1145/3319535.3339817
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security
Maller, M, Bowe, S, Kohlweiss, M & Meiklejohn, S 2019, Sonic: Zero-Knowledge SNARKs from Linear-Size Universal and Updateable Structured Reference Strings . in Proceedings of the Conference on Computer and Communications Security (CCS'19) . Association for Computing Machinery (ACM), pp. 2111-2128, 26th ACM Conference on Computer and Communications Security, London, United Kingdom, 11/11/19 . https://doi.org/10.1145/3319535.3339817
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security
Ever since their introduction, zero-knowledge proofs have become an important tool for addressing privacy and scalability concerns in a variety of applications. In many systems each client downloads and verifies every new proof, and so proofs must be