Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security 2017
DOI: 10.1145/3133956.3134104
|View full text |Cite
|
Sign up to set email alerts
|

Ligero

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 201 publications
(7 citation statements)
references
References 38 publications
0
3
0
Order By: Relevance
“…Finally, we obtain linear efficiency in the size of circuit. Despite being less efficient than state of the art post-quantum zero-knowledge proofs, such as [2,4,8] whose proofs sizes are sublinear or even polylogarithmic in the size of the witness, our approach still improves on the naive construction from one-way functions and provides a first general purpose zero-knowledge proof from isogenies.…”
Section: Discussion and Further Workmentioning
confidence: 99%
“…Finally, we obtain linear efficiency in the size of circuit. Despite being less efficient than state of the art post-quantum zero-knowledge proofs, such as [2,4,8] whose proofs sizes are sublinear or even polylogarithmic in the size of the witness, our approach still improves on the naive construction from one-way functions and provides a first general purpose zero-knowledge proof from isogenies.…”
Section: Discussion and Further Workmentioning
confidence: 99%
“…Verifiable computation is universally used to verify the correctness of outsourced computation tasks to apply outsourced computing resources. Various cryptographic methods, e.g., interactive proofs (IPs) [41], succinct non-interactive arguments of knowledge (SNARK) [42,43], and Authenticated Data Structure (ADS) [44] have become the mainstream methods of constructing verifiable outsourced computations to provide computational integrity. IPs are implemented according to the sum-check protocol and are often converted to circuits for proof.…”
Section: Verifiable Outsourced Computationmentioning
confidence: 99%
“…The main drawback is that they are still concretely inefficient, especially as far as prover complexity is concerned. In the same family, [22,30,2] build on the MPC-in-the-head paradigm [29] and share similar properties. The most efficient one is Ligero [2] which, while having good concrete efficiency, has communication complexity O λ ( |C|) which can be bad for moderately large computations.…”
Section: Related Workmentioning
confidence: 99%