Batching techniques for accumulators with applications to IOPs and stateless blockchains

D Boneh, B Bünz, B Fisch - Advances in Cryptology–CRYPTO 2019: 39th …, 2019 - Springer
We present batching techniques for cryptographic accumulators and vector commitments in
groups of unknown order. Our techniques are tailored for distributed settings where no …

Proofs, arguments, and zero-knowledge

J Thaler - Foundations and Trends® in Privacy and Security, 2022 - nowpublishers.com
Interactive proofs (IPs) and arguments are cryptographic protocols that enable an untrusted
prover to provide a guarantee that it performed a requested computation correctly …

Optimal structure-preserving signatures in asymmetric bilinear groups

M Abe, J Groth, K Haralambiev, M Ohkubo - … CA, USA, August 14-18, 2011 …, 2011 - Springer
Abstract Structure-preserving signatures are signatures defined over bilinear groups that
rely on generic group operations. In particular, the messages and signatures consist of …

Succinct zero-knowledge batch proofs for set accumulators

M Campanelli, D Fiore, S Han, J Kim… - Proceedings of the …, 2022 - dl.acm.org
Cryptographic accumulators are a common solution to proving information about a large set
S. They allow one to compute a short digest of S and short certificates of some of its basic …

Distributed paillier cryptosystem without trusted dealer

T Nishide, K Sakurai - International Workshop on Information Security …, 2010 - Springer
We propose a distributed key generation protocol for the threshold Paillier cryptosystem.
Often in the multiparty computation based on the threshold Paillier cryptosystem, the …

Cicada: A framework for private non-interactive on-chain auctions and voting

N Glaeser, IA Seres, M Zhu, J Bonneau - Cryptology ePrint Archive, 2023 - eprint.iacr.org
Auction and voting schemes play a crucial role in the Web3 ecosystem. Yet currently
deployed implementations either lack privacy or require at least two rounds, hindering …

[PDF][PDF] Secure multiparty computation of threshold signatures made more efficient

HWH Wong, JPK Ma… - ISOC Network and …, 2024 - ndss-symposium.org
Threshold signatures, notably ECDSA, are fundamental for securing decentralized
applications. Their non-linear structure poses challenges in distributed signing, often tackled …

A-poa: Anonymous proof of authorization for decentralized identity management

J Lauinger, J Ernstberger, E Regnath… - … on Blockchain and …, 2021 - ieeexplore.ieee.org
Self-sovereign Identity Management (SSIM) pro-motes self-control of credentials without
relying on external administration. However, the state-of-the-art SSIM based on …

A machine-checked formalization of sigma-protocols

G Barthe, D Hedin, SZ Béguelin… - 2010 23rd IEEE …, 2010 - ieeexplore.ieee.org
Zero-knowledge proofs have a vast applicability in the domain of cryptography, stemming
from the fact that they can be used to force potentially malicious parties to abide by the rules …

An airdrop that preserves recipient privacy

RS Wahby, D Boneh, C Jeffrey, J Poon - Financial Cryptography and Data …, 2020 - Springer
A common approach to bootstrap** a new cryptocurrency is an airdrop, an arrangement in
which existing users give away currency to entice new users to join. But current airdrops …