What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Jens Groth
Google Scholar
ORCID:
0000-0001-6291-7832
55
publications in security and cryptology related venues
Year
Venue
Title
2024
conf/eurocrypt
Fast Batched Asynchronous Distributed Key Generation.
Jens Groth
Victor Shoup
2022
conf/eurocrypt
On the Security of ECDSA with Additive Key Derivation and Presignatures.
Jens Groth
Victor Shoup
2020
journals/joc
Foundations of Fully Dynamic Group Signatures.
Jonathan Bootle
Andrea Cerulli
Pyrros Chaidos
Essam Ghadafi
Jens Groth
2020
conf/tcc
Linear-Time Arguments with Sublinear Verification from Tensor Codes.
Jonathan Bootle
Alessandro Chiesa
Jens Groth
2019
journals/joc
Efficient Fully Structure-Preserving Signatures and Shrinking Commitments.
Masayuki Abe
Jens Groth
Markulf Kohlweiss
Miyako Ohkubo
Mehdi Tibouchi
2018
conf/crypto
Sub-linear Lattice-Based Zero-Knowledge Arguments for Arithmetic Circuits.
Carsten Baum
Jonathan Bootle
Andrea Cerulli
Rafaël del Pino
Jens Groth
Vadim Lyubashevsky
2018
conf/crypto
Updatable and Universal Common Reference Strings with Applications to zk-SNARKs.
Jens Groth
Markulf Kohlweiss
Mary Maller
Sarah Meiklejohn
Ian Miers
2018
conf/pkc
Efficient Batch Zero-Knowledge Arguments for Low Degree Polynomials.
Jonathan Bootle
Jens Groth
2018
conf/asiacrypt
Arya: Nearly Linear-Time Zero-Knowledge Proofs for Correct Program Execution.
Jonathan Bootle
Andrea Cerulli
Jens Groth
Sune K. Jakobsen
Mary Maller
2017
conf/crypto
Snarky Signatures: Minimal Signatures of Knowledge from Simulation-Extractable SNARKs.
Jens Groth
Mary Maller
2017
conf/asiacrypt
Linear-Time Zero-Knowledge Proofs for Arithmetic Circuit Satisfiability.
Jonathan Bootle
Andrea Cerulli
Essam Ghadafi
Jens Groth
Mohammad Hajiabadi
Sune K. Jakobsen
2017
conf/asiacrypt
Towards a Classification of Non-interactive Computational Assumptions in Cyclic Groups.
Essam Ghadafi
Jens Groth
2016
journals/joc
Structure-Preserving Signatures and Commitments to Group Elements.
Masayuki Abe
Georg Fuchsbauer
Jens Groth
Kristiyan Haralambiev
Miyako Ohkubo
2016
conf/acns
Foundations of Fully Dynamic Group Signatures.
Jonathan Bootle
Andrea Cerulli
Pyrros Chaidos
Essam Ghadafi
Jens Groth
2016
conf/eurocrypt
Efficient Zero-Knowledge Arguments for Arithmetic Circuits in the Discrete Log Setting.
Jonathan Bootle
Andrea Cerulli
Pyrros Chaidos
Jens Groth
Christophe Petit
2016
conf/eurocrypt
On the Size of Pairing-Based Non-interactive Arguments.
Jens Groth
2015
journals/joc
Using Fully Homomorphic Hybrid Encryption to Minimize Non-interative Zero-Knowledge Proofs.
Craig Gentry
Jens Groth
Yuval Ishai
Chris Peikert
Amit Sahai
Adam D. Smith
2015
conf/esorics
Short Accountable Ring Signatures Based on DDH.
Jonathan Bootle
Andrea Cerulli
Pyrros Chaidos
Essam Ghadafi
Jens Groth
Christophe Petit
2015
conf/pkc
Making Sigma-Protocols Non-interactive Without Random Oracles.
Pyrros Chaidos
Jens Groth
2015
conf/eurocrypt
One-Out-of-Many Proofs: Or How to Leak a Secret and Spend a Coin.
Jens Groth
Markulf Kohlweiss
2015
conf/asiacrypt
Efficient Fully Structure-Preserving Signatures for Large Messages.
Jens Groth
2014
journals/joc
Cryptography in the Multi-string Model.
Jens Groth
Rafail Ostrovsky
2014
conf/crypto
Converting Cryptographic Schemes from Symmetric to Asymmetric Bilinear Groups.
Masayuki Abe
Jens Groth
Miyako Ohkubo
Takeya Tango
2014
conf/crypto
Structure-Preserving Signatures from Type II Pairings.
Masayuki Abe
Jens Groth
Miyako Ohkubo
Mehdi Tibouchi
2014
conf/pkc
Fine-Tuning Groth-Sahai Proofs.
Alex Escala
Jens Groth
2014
conf/asiacrypt
Square Span Programs with Applications to Succinct NIZK Arguments.
George Danezis
Cédric Fournet
Jens Groth
Markulf Kohlweiss
2014
conf/tcc
Unified, Minimal and Selectively Randomizable Structure-Preserving Signatures.
Masayuki Abe
Jens Groth
Miyako Ohkubo
Mehdi Tibouchi
2013
conf/eurocrypt
Zero-Knowledge Argument for Polynomial Evaluation with Application to Blacklists.
Stephanie Bayer
Jens Groth
2012
conf/eurocrypt
Efficient Zero-Knowledge Argument for Correctness of a Shuffle.
Stephanie Bayer
Jens Groth
2011
conf/crypto
Optimal Structure-Preserving Signatures in Asymmetric Bilinear Groups.
Masayuki Abe
Jens Groth
Kristiyan Haralambiev
Miyako Ohkubo
2011
conf/provsec
Optimal Structure-Preserving Signatures.
Jens Groth
2011
conf/asiacrypt
Separating Short Structure-Preserving Signatures from Non-interactive Assumptions.
Masayuki Abe
Jens Groth
Miyako Ohkubo
2011
conf/asiacrypt
Efficient Zero-Knowledge Arguments from Two-Tiered Homomorphic Commitments.
Jens Groth
2011
conf/africacrypt
Efficient Zero-Knowledge Proofs.
Jens Groth
2010
journals/joc
A Verifiable Secret Shuffle of Homomorphic Encryptions.
Jens Groth
2010
conf/crypto
Structure-Preserving Signatures and Commitments to Group Elements.
Masayuki Abe
Georg Fuchsbauer
Jens Groth
Kristiyan Haralambiev
Miyako Ohkubo
2010
conf/pkc
Multi-query Computationally-Private Information Retrieval with Constant Communication Rate.
Jens Groth
Aggelos Kiayias
Helger Lipmaa
2010
conf/asiacrypt
Short Pairing-Based Non-interactive Zero-Knowledge Arguments.
Jens Groth
2010
conf/asiacrypt
Short Non-interactive Zero-Knowledge Proofs.
Jens Groth
2009
conf/crypto
Linear Algebra with Sub-linear Zero-Knowledge Arguments.
Jens Groth
2008
conf/eurocrypt
Sub-linear Zero-Knowledge Argument for Correctness of a Shuffle.
Jens Groth
Yuval Ishai
2008
conf/eurocrypt
Efficient Non-interactive Proof Systems for Bilinear Groups.
Jens Groth
Amit Sahai
2007
conf/crypto
Cryptography in the Multi-string Model.
Jens Groth
Rafail Ostrovsky
2007
conf/pkc
Verifiable Shuffle of Large Size Ciphertexts.
Jens Groth
Steve Lu
2007
conf/asiacrypt
A Non-interactive Shuffle with Pairing Based Verifiability.
Jens Groth
Steve Lu
2007
conf/asiacrypt
Fully Anonymous Group Signatures Without Random Oracles.
Jens Groth
2006
conf/crypto
Non-interactive Zaps and New Techniques for NIZK.
Jens Groth
Rafail Ostrovsky
Amit Sahai
2006
conf/eurocrypt
Perfect Non-interactive Zero Knowledge for NP.
Jens Groth
Rafail Ostrovsky
Amit Sahai
2006
conf/asiacrypt
Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures.
Jens Groth
2005
conf/acns
Non-interactive Zero-Knowledge Arguments for Voting.
Jens Groth
2005
conf/tcc
Cryptography in Subgroups of Z<sub>n</sub>.
Jens Groth
2004
conf/fc
Efficient Maximal Privacy in Boardroom Voting and Anonymous Broadcast.
Jens Groth
2004
conf/acns
Evaluating Security of Voting Schemes in the Universal Composability Framework.
Jens Groth
2004
conf/tcc
Rerandomizable and Replayable Adaptive Chosen Ciphertext Attack Secure Cryptosystems.
Jens Groth
2003
conf/pkc
A Verifiable Secret Shuffle of Homomorphic Encryptions.
Jens Groth
Coauthors
Adam D. Smith
(1)
Aggelos Kiayias
(1)
Alessandro Chiesa
(1)
Alex Escala
(1)
Amit Sahai
(4)
Andrea Cerulli
(7)
Carsten Baum
(1)
Cédric Fournet
(1)
Chris Peikert
(1)
Christophe Petit
(2)
Craig Gentry
(1)
Essam Ghadafi
(5)
Georg Fuchsbauer
(2)
George Danezis
(1)
Helger Lipmaa
(1)
Ian Miers
(1)
Jens Groth
(55)
Jonathan Bootle
(9)
Kristiyan Haralambiev
(3)
Markulf Kohlweiss
(4)
Mary Maller
(3)
Masayuki Abe
(8)
Mehdi Tibouchi
(3)
Miyako Ohkubo
(8)
Mohammad Hajiabadi
(1)
Pyrros Chaidos
(5)
Rafaël del Pino
(1)
Rafail Ostrovsky
(4)
Sarah Meiklejohn
(1)
Stephanie Bayer
(2)
Steve Lu
(2)
Sune K. Jakobsen
(2)
Takeya Tango
(1)
Vadim Lyubashevsky
(1)
Victor Shoup
(2)
Yuval Ishai
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to