The system will be going down for regular maintenance. Please save your work and logout.

Show simple item record

hal.structure.identifierConstruction and Analysis of Systems for Confidentiality and Authenticity of Data and Entities [CASCADE]
hal.structure.identifierLaboratoire d'informatique de l'école normale supérieure [LIENS]
dc.contributor.authorBLAZY, Olivier
hal.structure.identifierConstruction and Analysis of Systems for Confidentiality and Authenticity of Data and Entities [CASCADE]
hal.structure.identifierLaboratoire d'informatique de l'école normale supérieure [LIENS]
dc.contributor.authorFUCHSBAUER, Georg
hal.structure.identifierUniversité de Versailles Saint-Quentin-en-Yvelines [UVSQ]
dc.contributor.authorIZABACHÈNE, Malika
hal.structure.identifierOrange Labs [Caen]
hal.structure.identifierInstitut de Mathématiques de Bordeaux [IMB]
dc.contributor.authorJAMBERT, Amandine
hal.structure.identifierST-Ericsson [Le Mans]
dc.contributor.authorSIBERT, Hervé
hal.structure.identifierConstruction and Analysis of Systems for Confidentiality and Authenticity of Data and Entities [CASCADE]
hal.structure.identifierLaboratoire d'informatique de l'école normale supérieure [LIENS]
dc.contributor.authorVERGNAUD, Damien
dc.contributor.editorJianying Zhou and Moti Yung
dc.date.accessioned2024-04-04T02:27:06Z
dc.date.available2024-04-04T02:27:06Z
dc.date.issued2010-03-16
dc.date.conference2010-06-22
dc.identifier.urihttps://oskar-bordeaux.fr/handle/20.500.12278/190002
dc.description.abstractEnIn 2008, Groth and Sahai proposed a general methodology for constructing non-interactive zero-knowledge (and witness-indistinguishable) proofs in bilinear groups. While avoiding expensive NP-reductions, these proof systems are still inefficient due to a number of pairing computations required for verification. We apply recent techniques of batch verification to the Groth-Sahai proof systems and manage to improve significantly the complexity of proof verification. We give explicit batch verification formulas for generic Groth-Sahai equations (whose cost is less than a tenth of the original) and also for specific popular protocols relying on their methodology (namely Groth's group signatures and Belenkiy-Chase-Kohlweiss-Lysyanskaya's P-signatures).
dc.description.sponsorshipPairings and Advances in Cryptology for E-cash - ANR-07-TCOM-0013
dc.language.isoen
dc.publisherSpringer
dc.subject.enPairing-based cryptography
dc.subject.enBatch veri cation
dc.subject.enGroth-Sahai proof system
dc.title.enBatch Groth-Sahai
dc.typeCommunication dans un congrès
dc.identifier.doi10.1007/978-3-642-13708-14
dc.subject.halInformatique [cs]/Cryptographie et sécurité [cs.CR]
dc.description.sponsorshipEuropeEuropean Network of Excellence in Cryptology - Phase II
bordeaux.page218-235
bordeaux.volume6123
bordeaux.hal.laboratoriesInstitut de Mathématiques de Bordeaux (IMB) - UMR 5251*
bordeaux.institutionUniversité de Bordeaux
bordeaux.institutionBordeaux INP
bordeaux.institutionCNRS
bordeaux.conference.titleApplied Cryptography and Network Security, 8th International Conference, ACNS 2010
bordeaux.countryCN
bordeaux.conference.cityBeijing
bordeaux.peerReviewedoui
hal.identifierinria-00577167
hal.version1
hal.invitednon
hal.proceedingsoui
hal.conference.end2010-06-25
hal.popularnon
hal.audienceInternationale
hal.origin.linkhttps://hal.archives-ouvertes.fr//inria-00577167v1
bordeaux.COinSctx_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.date=2010-03-16&rft.volume=6123&rft.spage=218-235&rft.epage=218-235&rft.au=BLAZY,%20Olivier&FUCHSBAUER,%20Georg&IZABACH%C3%88NE,%20Malika&JAMBERT,%20Amandine&SIBERT,%20Herv%C3%A9&rft.genre=unknown


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record