An algebraic framework for Diffie–Hellman assumptions

A Escala, G Herold, E Kiltz, C Ràfols, J Villar - Journal of cryptology, 2017 - Springer
We put forward a new algebraic framework to generalize and analyze Diffie–Hellman like
decisional assumptions which allows us to argue about security and applications by …

Shorter quasi-adaptive NIZK proofs for linear subspaces

CS Jutla, A Roy - Journal of Cryptology, 2017 - Springer
We define a novel notion of quasi-adaptive non-interactive zero-knowledge (NIZK) proofs for
probability distributions on parameterized languages. It is quasi-adaptive in the sense that …

Quasi-adaptive NIZK for linear subspaces revisited

E Kiltz, H Wee - Annual International Conference on the Theory and …, 2015 - Springer
Non-interactive zero-knowledge (NIZK) proofs for algebraic relations in a group, such as the
Groth-Sahai proofs, are an extremely powerful tool in pairing-based cryptography. A series …

Linearly homomorphic structure-preserving signatures and their applications

B Libert, T Peters, M Joye, M Yung - Designs, Codes and Cryptography, 2015 - Springer
Abstract Structure-preserving signatures (SPS) are signature schemes where messages,
signatures and public keys all consist of elements of a group over which a bilinear map is …

SPHF-friendly non-interactive commitments

M Abdalla, F Benhamouda, O Blazy… - … Conference on the …, 2013 - Springer
In 2009, Abdalla et al. proposed a reasonably practical password-authenticated key
exchange (PAKE) secure against adaptive adversaries in the universal composability (UC) …

Compactly hiding linear spans: Tightly secure constant-size simulation-sound QA-NIZK proofs and applications

B Libert, T Peters, M Joye, M Yung - … on the Theory and Application of …, 2015 - Springer
Quasi-adaptive non-interactive zero-knowledge (QA-NIZK) proofs is a recent paradigm,
suggested by Jutla and Roy (Asiacrypt'13), which is motivated by the Groth-Sahai seminal …

A stronger secure ciphertext fingerprint-based commitment scheme for robuster verifiable OD-CP-ABE in IMCC

Z Zhang, W Huang, L Yang, Y Liao… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
Outsourced decryption attribute-based encryption (OD-ABE) is emerging as a promising
cryptographic tool to provide efficient fine-grained access control for data accessing and …

Improved (almost) tightly-secure simulation-sound QA-NIZK with applications

M Abe, CS Jutla, M Ohkubo, A Roy - … on the Theory and Application of …, 2018 - Springer
We construct the first (almost) tightly-secure unbounded-simulation-sound quasi-adaptive
non-interactive zero-knowledge arguments (USS-QA-NIZK) for linear-subspace languages …

On QA-NIZK in the BPK model

B Abdolmaleki, H Lipmaa, J Siim, M Zając - … Edinburgh, UK, May 4–7, 2020 …, 2020 - Springer
Recently, Bellare et al. defined subversion-resistance (security in the case the CRS creator
may be malicious) for NIZK. In particular, a Sub-ZK NIZK is zero-knowledge, even in the …

Shorter QA-NIZK and SPS with tighter security

M Abe, CS Jutla, M Ohkubo, J Pan, A Roy… - … Conference on the …, 2019 - Springer
Quasi-adaptive non-interactive zero-knowledge proof (QA-NIZK) systems and structure-
preserving signature (SPS) schemes are two powerful tools for constructing practical pairing …