Batch Groth-Sahai
hal.structure.identifier | Construction and Analysis of Systems for Confidentiality and Authenticity of Data and Entities [CASCADE] | |
hal.structure.identifier | Laboratoire d'informatique de l'école normale supérieure [LIENS] | |
dc.contributor.author | BLAZY, Olivier | |
hal.structure.identifier | Construction and Analysis of Systems for Confidentiality and Authenticity of Data and Entities [CASCADE] | |
hal.structure.identifier | Laboratoire d'informatique de l'école normale supérieure [LIENS] | |
dc.contributor.author | FUCHSBAUER, Georg | |
hal.structure.identifier | Université de Versailles Saint-Quentin-en-Yvelines [UVSQ] | |
dc.contributor.author | IZABACHÈNE, Malika | |
hal.structure.identifier | Orange Labs [Caen] | |
hal.structure.identifier | Institut de Mathématiques de Bordeaux [IMB] | |
dc.contributor.author | JAMBERT, Amandine | |
hal.structure.identifier | ST-Ericsson [Le Mans] | |
dc.contributor.author | SIBERT, Hervé | |
hal.structure.identifier | Construction and Analysis of Systems for Confidentiality and Authenticity of Data and Entities [CASCADE] | |
hal.structure.identifier | Laboratoire d'informatique de l'école normale supérieure [LIENS] | |
dc.contributor.author | VERGNAUD, Damien | |
dc.contributor.editor | Jianying Zhou and Moti Yung | |
dc.date.accessioned | 2024-04-04T02:27:06Z | |
dc.date.available | 2024-04-04T02:27:06Z | |
dc.date.issued | 2010-03-16 | |
dc.date.conference | 2010-06-22 | |
dc.identifier.uri | https://oskar-bordeaux.fr/handle/20.500.12278/190002 | |
dc.description.abstractEn | In 2008, Groth and Sahai proposed a general methodology for constructing non-interactive zero-knowledge (and witness-indistinguishable) proofs in bilinear groups. While avoiding expensive NP-reductions, these proof systems are still inefficient due to a number of pairing computations required for verification. We apply recent techniques of batch verification to the Groth-Sahai proof systems and manage to improve significantly the complexity of proof verification. We give explicit batch verification formulas for generic Groth-Sahai equations (whose cost is less than a tenth of the original) and also for specific popular protocols relying on their methodology (namely Groth's group signatures and Belenkiy-Chase-Kohlweiss-Lysyanskaya's P-signatures). | |
dc.description.sponsorship | Pairings and Advances in Cryptology for E-cash - ANR-07-TCOM-0013 | |
dc.language.iso | en | |
dc.publisher | Springer | |
dc.subject.en | Pairing-based cryptography | |
dc.subject.en | Batch veri cation | |
dc.subject.en | Groth-Sahai proof system | |
dc.title.en | Batch Groth-Sahai | |
dc.type | Communication dans un congrès | |
dc.identifier.doi | 10.1007/978-3-642-13708-14 | |
dc.subject.hal | Informatique [cs]/Cryptographie et sécurité [cs.CR] | |
dc.description.sponsorshipEurope | European Network of Excellence in Cryptology - Phase II | |
bordeaux.page | 218-235 | |
bordeaux.volume | 6123 | |
bordeaux.hal.laboratories | Institut de Mathématiques de Bordeaux (IMB) - UMR 5251 | * |
bordeaux.institution | Université de Bordeaux | |
bordeaux.institution | Bordeaux INP | |
bordeaux.institution | CNRS | |
bordeaux.conference.title | Applied Cryptography and Network Security, 8th International Conference, ACNS 2010 | |
bordeaux.country | CN | |
bordeaux.conference.city | Beijing | |
bordeaux.peerReviewed | oui | |
hal.identifier | inria-00577167 | |
hal.version | 1 | |
hal.invited | non | |
hal.proceedings | oui | |
hal.conference.end | 2010-06-25 | |
hal.popular | non | |
hal.audience | Internationale | |
hal.origin.link | https://hal.archives-ouvertes.fr//inria-00577167v1 | |
bordeaux.COinS | ctx_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.date=2010-03-16&rft.volume=6123&rft.spage=218-235&rft.epage=218-235&rft.au=BLAZY,%20Olivier&FUCHSBAUER,%20Georg&IZABACH%C3%88NE,%20Malika&JAMBERT,%20Amandine&SIBERT,%20Herv%C3%A9&rft.genre=unknown |
Fichier(s) constituant ce document
Fichiers | Taille | Format | Vue |
---|---|---|---|
Il n'y a pas de fichiers associés à ce document. |