Author of the publication

Efficient NIZK Arguments with Straight-Line Simulation and Extraction.

, and . CANS, volume 13641 of Lecture Notes in Computer Science, page 3-22. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Defining Proofs of Knowledge in the Bare Public Key Model., and . ICTCS, page 187-198. World Scientific, (2007)Universally Composable Secure Computation with Corrupted Tokens., , , and . CRYPTO (3), volume 11694 of Lecture Notes in Computer Science, page 432-461. Springer, (2019)Digital contact Tracing solutions: Promises, Pitfalls and Challenges., , , , and . ArXiv I arXiv 2202.06698v2 (October 2022), (October 2022)Improved OR Composition of Sigma-Protocols., , , , and . IACR Cryptology ePrint Archive, (2015)Co-sound Zero-Knowledge with Public Keys., and . AFRICACRYPT, volume 5580 of Lecture Notes in Computer Science, page 287-304. Springer, (2009)Non-Interactive Zero Knowledge Proofs in the Random Oracle Model., and . IACR Cryptology ePrint Archive, (2019)A Format-Independent Architecture for Run-Time Integrity Checking of Executable Code., and . SCN, volume 2576 of Lecture Notes in Computer Science, page 219-233. Springer, (2002)The Right to Be Zero-Knowledge Forgotten.. ARES, page 110:1-110:9. ACM, (2024)Trust Nobody: Privacy-Preserving Proofs for Edited Photos with Your Laptop., , , and . IACR Cryptol. ePrint Arch., (2024)Incremental Time-Deniable Signatures., and . ESORICS (4), volume 14985 of Lecture Notes in Computer Science, page 414-434. Springer, (2024)