2015
DOI: 10.1007/978-3-662-48797-6_25
|View full text |Cite
|
Sign up to set email alerts
|

QA-NIZK Arguments in Asymmetric Groups: New Tools and New Constructions

Abstract: A sequence of recent works have constructed constant-size quasi-adaptive (QA) NIZK arguments of membership in linear subspaces ofĜ m , whereĜ is a group equipped with a bilinear map e :Ĝ ×Ȟ → T. Although applicable to any bilinear group, these techniques are less useful in the asymmetric case. For example, Jutla and Roy (Crypto 2014) show how to do QA aggregation of Groth-Sahai proofs, but the types of equations which can be aggregated are more restricted in the asymmetric setting. Furthermore, there are natur… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

2
82
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
6
1

Relationship

5
2

Authors

Journals

citations
Cited by 24 publications
(84 citation statements)
references
References 25 publications
2
82
0
Order By: Relevance
“…Theorem 2 supports the intuition that there is a tradeoff between the size of the matrix -which typically results in less efficiency -and the hardness of the KerMDH Problems, and justifies the generalization of several protocols to different choices of k given in [17,[24][25][26].…”
Section: Our Resultssupporting
confidence: 62%
See 3 more Smart Citations
“…Theorem 2 supports the intuition that there is a tradeoff between the size of the matrix -which typically results in less efficiency -and the hardness of the KerMDH Problems, and justifies the generalization of several protocols to different choices of k given in [17,[24][25][26].…”
Section: Our Resultssupporting
confidence: 62%
“…The discussion of our results given so far should already highlight some of the advantages of using the new Kernel family of assumptions and the power of these new assumptions, which have already been used in compelling applications in follow-up work in [17,25,26]. To further illustrate the usefulness of the new framework, we apply it to the study of trapdoor commitments.…”
Section: Our Resultsmentioning
confidence: 95%
See 2 more Smart Citations
“…Many of the equations in bilinear groups one wants to batch verify are very structured (e.g. GS proofs [35], structure preserving cryptography [1,41] or the protocols [33,42]). For instance, many of them consist simply of matrix-vector multiplication in the exponent.…”
Section: Introductionmentioning
confidence: 99%