Author:
Heath David,Kolesnikov Vladimir
Publisher
Springer International Publishing
Reference43 articles.
1. Ames, S., Hazay, C., Ishai, Y., Venkitasubramaniam, M.: Ligero: lightweight sublinear arguments without a trusted setup. In: Bhavani, M.T., Evans, D., Malkin, T., Xu, D. (ed.) ACM CCS 2017, pp. 2087–2104. ACM Press, October/November 2017
2. Lecture Notes in Computer Science;G Asharov,2015
3. Bünz, B., Bootle, J., Boneh, D., Poelstra, A., Wuille, P., Maxwell, G.: Bulletproofs: short proofs for confidential transactions and more. In: 2018 IEEE Symposium on Security and Privacy, pp. 315–334. IEEE Computer Society Press, May 2018
4. Ben-Sasson, E., Bentov, I., Horesh, Y., Riabzev, M.: Scalable, transparent, and post-quantum secure computational integrity. Cryptology ePrint Archive, Report 2018/046 (2018).
https://eprint.iacr.org/2018/046
5. Lecture Notes in Computer Science;E Ben-Sasson,2019
Cited by
35 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Verifiable and Privacy-Preserving Federated Learning Training Framework;IEEE Transactions on Dependable and Secure Computing;2024-09
2. More Efficient Zero-Knowledge Protocols over $$\mathbb {Z}_{2^k}$$ via Galois Rings;Lecture Notes in Computer Science;2024
3. CDS Composition of Multi-round Protocols;Lecture Notes in Computer Science;2024
4. Batchman and Robin: Batched and Non-batched Branching for Interactive ZK;Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security;2023-11-15
5. Ou: Automating the Parallelization of Zero-Knowledge Protocols;Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security;2023-11-15