DL-extractable UC-commitment schemes
… scheme for scalars [19]. To avoid using non-falsifiable assumptions in this case, one can use
a DL-extractable commitment scheme … ) of a DL-extractable commitment scheme. Intuitively, …
a DL-extractable commitment scheme … ) of a DL-extractable commitment scheme. Intuitively, …
A framework for uc-secure commitments from publicly computable smooth projective hashing
B Abdolmaleki, H Khoshakhlagh… - Cryptography and Coding …, 2019 - Springer
… Consequently, assuming point compression is used in both schemes, the commitment
and opening size of the UC-commitment in [2] is 1799 and 512 bits respectively. Our UC-secure …
and opening size of the UC-commitment in [2] is 1799 and 512 bits respectively. Our UC-secure …
[PDF][PDF] BEHZAD ABDOLMALEKI
OS Non-Interactive - core.ac.uk
… DL-extractable UC-commitment schemes. In ACNS 2019, volume 11464 of LNCS, pages …
commitments and propose a new scheme called DL-extractable commitment that allows one to …
commitments and propose a new scheme called DL-extractable commitment that allows one to …
UC-secure CRS generation for SNARKs
… [1] recently proposed a discrete logarithm extractable (DL-extractable) UC-commitment
scheme. Differently from the usual UC-commitment, a committer will open the commitment to \([m]…
scheme. Differently from the usual UC-commitment, a committer will open the commitment to \([m]…
[PDF][PDF] Design of Extended Core Protocols
… 19a] recently proposed a discrete logarithm extractable (DL-extractable) UC-commitment
scheme. Differently from the usual UC-commitment, a committer will open the commitment to [m]…
scheme. Differently from the usual UC-commitment, a committer will open the commitment to [m]…
A flexible and scalable malicious secure aggregation protocol for federated learning
J Tang, H Xu, M Wang, T Tang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
… DL-extractable and equivocable commitment scheme for vectors, which may be of independent
interest. It is based on two commitment schemes (… a DLextractable UC commitment [50] in …
interest. It is based on two commitment schemes (… a DLextractable UC commitment [50] in …
Scalable decentralized privacy-preserving usage-based insurance for vehicles
… scheme, called DUBI, based on the blockchain technology and zero-knowledge proof. In our
scheme, a … 1) We propose DUBI, a fully decentralized UBI scheme based on the blockchain …
scheme, a … 1) We propose DUBI, a fully decentralized UBI scheme based on the blockchain …
A non-interactive shuffle argument with low trust assumptions
A Aggelakis, P Fauzi, G Korfiatis, P Louridas… - Topics in Cryptology–CT …, 2020 - Springer
… al.’s protocol which avoids the ROM by using a DL-extractable UC-commitment [ABL+19a]. …
_{i, r}\) with a UC-secure DL-extractable commitment scheme. This is followed by an opening …
_{i, r}\) with a UC-secure DL-extractable commitment scheme. This is followed by an opening …
A bivariate polynomial-based cryptographic hard problem and its applications
B Bagherpour - Designs, Codes and Cryptography, 2023 - Springer
… We also propose a new commitment scheme using the RSA-polynomial problem. The
proposed scheme outperforms the previous commitment schemes and is free of any group-…
proposed scheme outperforms the previous commitment schemes and is free of any group-…
Strong Privacy-Preserving Universally Composable AKA Protocol with Seamless Handover Support for Mobile Virtual Network Operator
… In this paper, we propose a universally composable authentication and handover scheme
with strong user privacy support, where each MVNO user can validate a mobile operator (MNO…
with strong user privacy support, where each MVNO user can validate a mobile operator (MNO…