2014
DOI: 10.1007/978-3-642-53997-8_4
|View full text |Cite
|
Sign up to set email alerts
|

New Results for the Practical Use of Range Proofs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
15
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 13 publications
(16 citation statements)
references
References 34 publications
1
15
0
Order By: Relevance
“…Yet, our set membership proof does not ask the prover (a SIM card and/or a smartphone in our setting) nor the verifier (in a specific scenario) to perform pairing computations. Our set membership proof is also more efficient and conceptually simpler than the recent one proposed by Canard et al at EuroPKI 2013 [12]. Their scheme which involves several verifiers, who share a decryption key, seems to be tailored to specific applications such as e-voting where the verifiers (tallying authorities) own such a key to open ballots.…”
Section: A New Set Membership Proofmentioning
confidence: 94%
See 1 more Smart Citation
“…Yet, our set membership proof does not ask the prover (a SIM card and/or a smartphone in our setting) nor the verifier (in a specific scenario) to perform pairing computations. Our set membership proof is also more efficient and conceptually simpler than the recent one proposed by Canard et al at EuroPKI 2013 [12]. Their scheme which involves several verifiers, who share a decryption key, seems to be tailored to specific applications such as e-voting where the verifiers (tallying authorities) own such a key to open ballots.…”
Section: A New Set Membership Proofmentioning
confidence: 94%
“…The proof of knowledge of a secret x ∈ Φ consists in proving the knowledge of a (public) signature on the secret x (which will be only possible if x belongs to the set Φ) without revealing x or the used signature. Solutions in [12,13] require the prover to perform pairing computations. However, these cryptographic tools are not often convenient for many constrained platforms.…”
Section: Set Membership Proofsmentioning
confidence: 99%
“…• Include Bulletproofs in the comparison presented in the work by Canard et al [16] and present our open source implementation [41].…”
Section: Contributionsmentioning
confidence: 99%
“…The authors also provided an efficient implementation that shows their proposal is adequate for many practical scenarios. However, this proposal was not included in the comparison by Canard et al [16], then one of the contributions of this work is to analyze how Bulletproofs compares to the other proposals. Actually, Bulletproofs is based on the decomposition of the secret into its bit representation, thus it fits the category described previously, but since it proposed a different framework for generating ZKPs, namely using PoK for inner product relations, then we considered important to separate Bulletproofs in order to give it more focus.…”
Section: Zero Knowledge Range Proofsmentioning
confidence: 99%
“…In supply chains, proving is as important as verifying, given their highly dynamic nature where large volumes of products are processed, and their updates has to be committed swiftly because they may go from one owner to another in under an hour. Proving times of [14,18,37] range between half an hour to over 3 hours for a reasonable 2 22 gate circuit.…”
Section: Related Workmentioning
confidence: 99%