Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security 2018
DOI: 10.1145/3243734.3243868
|View full text |Cite
|
Sign up to set email alerts
|

Compressing Vector OLE

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
81
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
9

Relationship

3
6

Authors

Journals

citations
Cited by 97 publications
(81 citation statements)
references
References 48 publications
0
81
0
Order By: Relevance
“…At a high level, OT extension protocols [IKNP03, KOS15, KKRT16, OOS17] turns a small number of base OTs into a near-arbitrary number of OTs, using only cheap operations. The latest generation of these protocols, initiated in [BCG + 17], leverages the notion of pseudorandom correlation generators (PCGs) [BCGI18,BCG + 19b] to enable the construction of extremely efficient OT extension protocols. This line of work recently culminated with the protocols of [BCG + 19a, SGRR19, WYKW20, YWL + 20].…”
Section: Introductionmentioning
confidence: 99%
“…At a high level, OT extension protocols [IKNP03, KOS15, KKRT16, OOS17] turns a small number of base OTs into a near-arbitrary number of OTs, using only cheap operations. The latest generation of these protocols, initiated in [BCG + 17], leverages the notion of pseudorandom correlation generators (PCGs) [BCGI18,BCG + 19b] to enable the construction of extremely efficient OT extension protocols. This line of work recently culminated with the protocols of [BCG + 19a, SGRR19, WYKW20, YWL + 20].…”
Section: Introductionmentioning
confidence: 99%
“…More precisely, we investigate the possibility of building NIZKs in groups where CDH does not hold. Then, further assuming the 2 −cλ -OW-KDM security of ElGamal with c = 28/29 + o(1), together with the assumption that Goldreich's PRG [22] instantiated under the Lombardi-Vaikuntanathan predicate [36] is secure up to some (arbitrarily small) polynomial stretch 6 , we propose an adaptively-sound, adaptively-multitheorem zero-knowledge (infinitely often) NIZK for all of NP. Both soundness and zero knowledge are computational, the first is implied by OW-KDM, while the second is implied by OW-KDM and the pseudorandomness of Goldreich's PRG.…”
Section: Our Contributionmentioning
confidence: 99%
“…In fact, the bigger picture is unclear, even for relaxations of NIZKs such as designated-verifier NIZKs (which are known based on DDH groups [14,31,49], factorization [12], or LPN [35] with a noise rate that implies PKE). The only known positive results are preprocessing NIZKs (where the prover and the verifier share a secret key) from flavors of LPN not known to imply PKE [6,7] and designated-prover NIZKs based on SIS [32]. Interestingly, we note that although the assumption of [9] is not known to imply PKE, a slight strengthening of the assumption would: assuming that it is hard to recover k given (g a , g k , g ak+f (k) ) (note the additional g k term) for any (even inefficient) f already implies PKE: setting f such that g f (k) = Encode(k) where Encode is some efficiently invertible encoding of k into a group element, we get that the assumption implies CDH (which itself is known to imply PKE).…”
Section: Introductionmentioning
confidence: 99%
“…Several recent works have also explored other relaxations of the standard notion of publiclyverifiable NIZKs such as the reusable designated-prover model (where there is a secret proving key and a public verification key) [KW18,KNYY19a] or the reusable preprocessing model (where both the proving and verifications keys are secret) [BCGI18,BCG + 19]. In this work, our focus is on reusable designated-verifier NIZKs and publicly-verifiable NIZKs.…”
Section: Introductionmentioning
confidence: 99%