Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,294,976 papers from all fields of science
Search
Sign In
Create Free Account
Common reference string model
Known as:
CRS
, Common reference sting model
, Common reference string
In cryptography, the common reference string (CRS) model captures the assumption that a trusted setup in which all involved parties get access to the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
3 relations
Non-interactive zero-knowledge proof
Provable security
Universal composability
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
Building Group Key Establishment on Group Theory: A Modular Approach
J. Bohli
,
María Isabel González Vasco
,
R. Steinwandt
Symmetry
2020
Corpus ID: 213407284
A group key establishment protocol is presented and proven secure in the common reference string mode. The protocol builds on a…
Expand
2019
2019
QAP-based Simulation-Extractable SNARK with a Single Verification
Jihye Kim
,
Jiwon Lee
,
Hyunok Oh
IACR Cryptology ePrint Archive
2019
Corpus ID: 173989386
. The pairing-based simulation-extractable succinct non-interactive arguments of knowledge (SE-SNARKs) are attractive since they…
Expand
2018
2018
Fine-Tuning Decentralized Anonymous Payment Systems based on Arguments for Arithmetic Circuit Satisfiability
Kamil Kluczniak
,
M. Au
IACR Cryptology ePrint Archive
2018
Corpus ID: 4030860
Digital currencies like Bitcoin and other blockchain based systems provide means to record monetary transfers between accounts…
Expand
2015
2015
Attribute-Based Signatures without Pairings by the Fiat-Shamir Transform ( Corrected Version ) ?
Hiroaki Anada
,
S. Arita
,
K. Sakurai
2015
Corpus ID: 35612052
We propose an attribute-based signature scheme (ABS) with features of pairing-free, short signatures and security proof in the…
Expand
2014
2014
Tuning a two-round group key agreement
Weizheng Gao
,
Kashi Neupane
,
R. Steinwandt
International Journal of Information Security
2014
Corpus ID: 254159200
In 2007, Bohli et al. (Int J Inf Secur 6:243–254, 2007) proposed a two-round group key agreement protocol in the random oracle…
Expand
2012
2012
An Efficient Non-interactive Universally Composable String-Commitment Scheme
R. Nishimaki
,
E. Fujisaki
,
Keisuke Tanaka
IEICE Transactions on Fundamentals of Electronics…
2012
Corpus ID: 122370154
This paper presents a new non-interactive string-commitment scheme that achieves universally composable security. Security is…
Expand
2010
2010
Efficient Implementation of the Orlandi Protocol Extended Version
Thomas P. Jakobsen
,
M. Makkes
,
Janus Dam Nielsen
IACR Cryptology ePrint Archive
2010
Corpus ID: 12073959
We present an efficient implementation of the Orlandi protocol which is the first implementation of a protocol for multiparty…
Expand
2007
2007
A Note on Universal Composable Zero Knowledge in Common Reference String Model
A. Yao
,
F. Yao
,
Yunlei Zhao
Theory and Applications of Models of Computation
2007
Corpus ID: 43880435
2005
2005
Universally Composable Time-Stamping Schemes with Audit
A. Buldas
,
Peeter Laud
,
M. Saarepera
,
J. Willemson
Information Security Conference
2005
Corpus ID: 8651908
We present a Universally Composable (UC) time-stamping scheme based on universal one-way hash functions. The model we use…
Expand
2004
2004
General Composability without a Common Reference String
M. Prabhakaran
,
A. Sahai
2004
Corpus ID: 17479071
We propose a modification to the frame-work of Universally Composable (UC) security [3]. Our new notion, involves comparing the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE