Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
  • Barthoulot A, Blazy O and Canard S. Cryptographic Accumulators: New Definitions, Enhanced Security, and Delegatable Proofs. Progress in Cryptology - AFRICACRYPT 2024. (94-119).

    https://doi.org/10.1007/978-3-031-64381-1_5

  • Fiore D, Kolonelos D and Perthuis P. Cuckoo Commitments: Registration-Based Encryption and Key-Value Map Commitments for Large Spaces. Advances in Cryptology – ASIACRYPT 2023. (166-200).

    https://doi.org/10.1007/978-981-99-8733-7_6

  • Lipmaa H and Parisella R. Set (Non-)Membership NIZKs from Determinantal Accumulators. Progress in Cryptology – LATINCRYPT 2023. (352-374).

    https://doi.org/10.1007/978-3-031-44469-2_18

  • Bacho R, Collins D, Liu-Zhang C and Loss J. Network-Agnostic Security Comes (Almost) for Free in DKG and MPC. Advances in Cryptology – CRYPTO 2023. (71-106).

    https://doi.org/10.1007/978-3-031-38557-5_3

  • Kakvi S, Martin K, Putman C and Quaglia E. SoK: Anonymous Credentials. Security Standardisation Research. (129-151).

    https://doi.org/10.1007/978-3-031-30731-7_6

  • Castagnos G, Laguillaumie F and Tucker I. Threshold Linearly Homomorphic Encryption on . Advances in Cryptology – ASIACRYPT 2022. (99-129).

    https://doi.org/10.1007/978-3-031-22966-4_4

  • Alupotha J, Boyen X and McKague M. Zero-History Confidential Chains with Zero-Knowledge Contracts: A New Normal for Decentralized Ledgers?. Computer Security – ESORICS 2022. (67-88).

    https://doi.org/10.1007/978-3-031-17140-6_4

  • Chu H, Fiore D, Kolonelos D and Schröder D. Inner Product Functional Commitments with Constant-Size Public Parameters and Openings. Security and Cryptography for Networks. (639-662).

    https://doi.org/10.1007/978-3-031-14791-3_28

  • Vitto G and Biryukov A. Dynamic Universal Accumulator with Batch Update over Bilinear Groups. Topics in Cryptology – CT-RSA 2022. (395-426).

    https://doi.org/10.1007/978-3-030-95312-6_17

  • Ren Y, Liu X, Wu Q, Wang L, Zhang W and Cimato S. (2022). Cryptographic Accumulator and Its Application. Security and Communication Networks. 2022. Online publication date: 1-Jan-2022.

    https://doi.org/10.1155/2022/5429195

  • Helminger L, Kales D, Ramacher S and Walch R. Multi-party Revocation in Sovrin: Performance through Distributed Trust. Topics in Cryptology – CT-RSA 2021. (527-551).

    https://doi.org/10.1007/978-3-030-75539-3_22

  • Benarroch D, Campanelli M, Fiore D, Gurkan K and Kolonelos D. Zero-Knowledge Proofs for Set Membership: Efficient, Succinct, Modular. Financial Cryptography and Data Security. (393-414).

    https://doi.org/10.1007/978-3-662-64322-8_19

  • Bailey B and Sankagiri S. Merkle Trees Optimized for Stateless Clients in Bitcoin. Financial Cryptography and Data Security. FC 2021 International Workshops. (451-466).

    https://doi.org/10.1007/978-3-662-63958-0_35

  • Ren Y, Qi J, Liu Y, Wang J and Kim G. (2021). Integrity Verification Mechanism of Sensor Data Based on Bilinear Map Accumulator. ACM Transactions on Internet Technology. 21:1. (1-19). Online publication date: 28-Feb-2021.

    https://doi.org/10.1145/3380749

  • Campanelli M, Fiore D, Greco N, Kolonelos D and Nizzardo L. Incrementally Aggregatable Vector Commitments and Applications to Verifiable Decentralized Storage. Advances in Cryptology – ASIACRYPT 2020. (3-35).

    https://doi.org/10.1007/978-3-030-64834-3_1

  • Schul-Ganz G and Segev G. Accumulators in (and Beyond) Generic Groups: Non-trivial Batch Verification Requires Interaction. Theory of Cryptography. (77-107).

    https://doi.org/10.1007/978-3-030-64378-2_4

  • Ozdemir A, Wahby R, Whitehat B and Boneh D. Scaling verifiable computation using efficient set accumulators. Proceedings of the 29th USENIX Conference on Security Symposium. (2075-2092).

    /doi/10.5555/3489212.3489329

  • Castagnos G, Catalano D, Laguillaumie F, Savasta F and Tucker I. Bandwidth-Efficient Threshold EC-DSA. Public-Key Cryptography – PKC 2020. (266-296).

    https://doi.org/10.1007/978-3-030-45388-6_10

  • Badimtsi F, Canetti R and Yakoubov S. Universally Composable Accumulators. Topics in Cryptology – CT-RSA 2020. (638-666).

    https://doi.org/10.1007/978-3-030-40186-3_27

  • Boneh D, Bünz B and Fisch B. Batching Techniques for Accumulators with Applications to IOPs and Stateless Blockchains. Advances in Cryptology – CRYPTO 2019. (561-586).

    https://doi.org/10.1007/978-3-030-26948-7_20

  • Lai R and Malavolta G. Subvector Commitments with Application to Succinct Arguments. Advances in Cryptology – CRYPTO 2019. (530-560).

    https://doi.org/10.1007/978-3-030-26948-7_19

  • Boneh D, Bonneau J, Bünz B and Fisch B. Verifiable Delay Functions. Advances in Cryptology – CRYPTO 2018. (757-788).

    https://doi.org/10.1007/978-3-319-96884-1_25

  • Ghosh E, Ohrimenko O, Papadopoulos D, Tamassia R and Triandopoulos N. Zero-Knowledge Accumulators and Set Algebra. Proceedings, Part II, of the 22nd International Conference on Advances in Cryptology --- ASIACRYPT 2016 - Volume 10032. (67-100).

    https://doi.org/10.1007/978-3-662-53890-6_3

  • Chase M and Meiklejohn S. Transparency Overlays and Applications. Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. (168-179).

    https://doi.org/10.1145/2976749.2978404

  • Libert B, Ling S, Nguyen K and Wang H. Zero-Knowledge Arguments for Lattice-Based Accumulators. Proceedings, Part II, of the 35th Annual International Conference on Advances in Cryptology --- EUROCRYPT 2016 - Volume 9666. (1-31).

    /doi/10.5555/3081738.3081739

  • Armknecht F, Bohli J, Karame G and Youssef F. Transparent Data Deduplication in the Cloud. Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. (886-900).

    https://doi.org/10.1145/2810103.2813630