This work was also supported in part by the European Union PROMETHEUS project (Horizon 2020 Research and Innovation Program, vol.780701 ,
Diophantine complexity, SFCS, pp.81-88, 1976. ,
Generating hard instances of lattice problems (extended abstract), STOC 1996, 1996. ,
Generating hard instances of the short basis problem, ICALP, 1999. ,
Collision-Free Accumulators and Fail-Stop Signature Schemes Without Trees, 1997. ,
Efficient commitments and zero-knowledge protocols from ring-sis with applications to lattice-based threshold cryptosystems, IACR Cryptology ePrint Archive, p.997, 2016. ,
Zero-knowledge argument for polynomial evaluation with application to blacklists, 2013. ,
DOI : 10.1007/978-3-642-38348-9_38
URL : https://link.springer.com/content/pdf/10.1007%2F978-3-642-38348-9_38.pdf
Verifiable partial key escrow, ACM-CCS, 1997. ,
DOI : 10.1145/266420.266439
URL : http://www-cse.ucsd.edu/users/mihir/papers/vpke.pdf
Efficient ZeroKnowledge Proofs for Commitments from Learning With Errors over Rings, ESORICS, 2015. ,
DOI : 10.1007/978-3-319-24174-6_16
URL : https://hal.archives-ouvertes.fr/hal-01214722
Efficient proofs that a committed number lies in an interval, Eurocrypt, 2000. ,
DOI : 10.1007/3-540-45539-6_31
URL : https://link.springer.com/content/pdf/10.1007%2F3-540-45539-6_31.pdf
Gradual and verifiable release of a secret, 1988. ,
Strong accumulators from collision-resistant hashing, Int. J. Inf. Sec, vol.11, issue.5, pp.349-363, 2012. ,
DOI : 10.1007/978-3-540-85886-7_32
Efficient protocols for set membership and range proofs, 2008. ,
Compact e-cash, Eurocrypt, 2005. ,
DOI : 10.1007/11426639_18
URL : https://link.springer.com/content/pdf/10.1007%2F11426639_18.pdf
An efficient system for non-transferable anonymous credentials with optional anonymity revocation, 2001. ,
DOI : 10.1007/3-540-44987-6_7
URL : https://link.springer.com/content/pdf/10.1007%2F3-540-44987-6_7.pdf
Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials, 2002. ,
Signature schemes and anonymous credentials from bilinear maps, Crypto, 2004. ,
DOI : 10.1007/978-3-540-28628-8_4
URL : https://link.springer.com/content/pdf/10.1007%2F978-3-540-28628-8_4.pdf
Enhancing privacy protection: Set membership, range proofs, and the extended access control, EPFL, 2017. ,
A non-interactive range proof with constant communication, Financial Cryptography, 2012. ,
DOI : 10.1007/978-3-642-32946-3_14
URL : http://infoscience.epfl.ch/record/187349/files/ChaabouniLZ12.pdf
Easy come-easy go divisible cash, Eurocrypt, 1998. ,
DOI : 10.1007/bfb0054154
URL : https://link.springer.com/content/pdf/10.1007%2FBFb0054154.pdf
Post-quantum zero-knowledge and signatures from symmetric-key primitives, ACM-CCS, 2017. ,
Removing the strong RSA assumption from arguments over the integers, Eurocrypt, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01471901
A statistically-hiding integer commitment scheme based on groups with hidden order, 2002. ,
A generalisation, a simplification and some applications of Paillier's probabilistic public-key system, PKC, 2001. ,
The decision problem for exponential diophantine equations, Annals of Mathematics, pp.425-436, 1961. ,
Certificate transparency with privacy, Privacy Enhancing Technologies, 2017. ,
Statistical zero knowledge protocols to prove modular polynomial relations, Crypto, 1997. ,
Trapdoors for hard lattices and new cryptographic constructions, STOC, 2008. ,
Zero-knowledge authenticated order queries and order statistics on a list, ACNS, 2015. ,
ZKBoo: faster zero-knowledge for boolean circuits, USENIX Security Symposium, 2016. ,
Robustness of the learning with errors assumption, ICS 2010, pp.230-240, 2010. ,
The knowledge complexity of interactive proof-systems, STOC, 1985. ,
New techniques for non-interactive shuffle and range arguments, ACNS, 2017. ,
Evaluating security of voting schemes in the universal composability framework, ACNS, 2004. ,
Cryptography in subgroups of Z n, TCC, 2005. ,
Non-interactive zero-knowledge arguments for voting, ACNS, 2005. ,
Efficient zero-knowledge arguments from two-tiered homomorphic commitments, Asiacrypt, 2011. ,
Zero-knowledge from secure multiparty computation, STOC, 2007. ,
Commitments and efficient zeroknowledge proofs from learning parity with noise, 2012. ,
Multiplication of many-digital numbers by automatic computers, Physics-Doklady, vol.7, pp.595-596, 1963. ,
Concurrently secure identification schemes based on the worst-case hardness of lattice problems, 2008. ,
The art of computer programming, Seminumerical Algorithms, vol.II, 1998. ,
Universal accumulators with efficient nonmembership proofs, ACNS, 2007. ,
DOI : 10.1007/978-3-540-72738-5_17
URL : http://www.cerias.purdue.edu/ssl/techreports-ssl/2007-47.pdf
Zero-knowledge arguments for matrix-vector relations and lattice-based group encryption, 2016. ,
DOI : 10.1007/978-3-662-53890-6_4
URL : https://hal.archives-ouvertes.fr/hal-01394087
Signature schemes with efficient protocols and dynamic group signatures from lattice assumptions, 2016. ,
DOI : 10.1007/978-3-662-53890-6_13
URL : https://hal.archives-ouvertes.fr/hal-01267123
Zero-knowledge arguments for latticebased accumulators: Logarithmic-size ring signatures and group signatures without trapdoors, 2016. ,
DOI : 10.1007/978-3-662-49896-5_1
URL : https://hal.archives-ouvertes.fr/hal-01314642
Zero-knowledge arguments for lattice-based PRFs and applications to e-cash, Asiacrypt, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01621027
Scalable group signatures with revocation, Eurocrypt, 2012. ,
DOI : 10.1007/978-3-642-29011-4_36
URL : https://link.springer.com/content/pdf/10.1007%2F978-3-642-29011-4_36.pdf
Improved zero-knowledge proofs of knowledge for the ISIS problem, and applications, PKC 2013, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-00767548
On Diophantine complexity and statistical zero-knowledge arguments, Asiacrypt, 2003. ,
DOI : 10.1007/978-3-540-40061-5_26
URL : https://link.springer.com/content/pdf/10.1007%2F978-3-540-40061-5_26.pdf
Secure vickrey auctions without threshold trust, Financial Cryptography, 2002. ,
DOI : 10.1007/3-540-36504-4_7
Lattice-Based Identification Schemes Secure Under Active Attacks, PKC, 2008. ,
DOI : 10.1007/978-3-540-78440-1_10
URL : https://link.springer.com/content/pdf/10.1007%2F978-3-540-78440-1_10.pdf
On ideal lattices and learning with errors over rings, 2010. ,
URL : https://hal.archives-ouvertes.fr/hal-00921792
A Certified Digital Signature, Crypto, 1989. ,
DOI : 10.1007/0-387-34805-0_21
URL : https://link.springer.com/content/pdf/10.1007%2F0-387-34805-0_21.pdf
Trapdoors for lattices: Simpler, tighter, faster, smaller, Eurocrypt, 2012. ,
DOI : 10.1007/978-3-642-29011-4_41
URL : https://link.springer.com/content/pdf/10.1007%2F978-3-642-29011-4_41.pdf
Hardness of SIS and LWE with small parameters, 2013. ,
Statistical zero-knowledge proofs with efficient provers: Lattice problems and more, 2003. ,
DOI : 10.1007/978-3-540-45146-4_17
URL : https://link.springer.com/content/pdf/10.1007%2F978-3-540-45146-4_17.pdf
Revocable group signature schemes with constant costs for signing and verifying, PKC, 2009. ,
Non-interactive and information-theoretic secure verifiable secret sharing, Crypto, vol.576, pp.129-140, 1991. ,
DOI : 10.1007/3-540-46766-1_9
URL : https://link.springer.com/content/pdf/10.1007%2F3-540-46766-1_9.pdf
On lattices, learning with errors, random linear codes, and cryptography, STOC, 2005. ,
A new paradigm for public key identification. Information Theory, IEEE Transactions on, vol.42, issue.6, 1996. ,
Zero knowledge proofs from ring-LWE, CANS, 2013. ,