Cryptographers' World
 

Jens Groth


Author's Web Page Link

16 papers in database with 603 citations Star

H-number: 13

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Jens Groth,  Linear Algebra with Sub-linear Zero-Knowledge Arguments, pp. 192 - 208, CRYPTO 2009.

[Electronic Edition][Cited 7 times ]

2. Jens Groth,  Yuval Ishai,  Sub-linear Zero-Knowledge Argument for Correctness of a Shuffle, pp. 379 - 396, EUROCRYPT 2008.

[Electronic Edition][Cited 16 times ]

3. Jens Groth,  Amit Sahai,  Efficient Non-interactive Proof Systems for Bilinear Groups, pp. 415 - 432, EUROCRYPT 2008.

[Electronic Edition][Cited 81 times Red Star]

4. Jens Groth,  Fully Anonymous Group Signatures Without Random Oracles, pp. 164 - 180, ASIACRYPT 2007.

[Electronic Edition][Cited 54 times Red Star]

5. Jens Groth,  Steve Lu,  A Non-interactive Shuffle with Pairing Based Verifiability, pp. 51 - 67, ASIACRYPT 2007.

[Electronic Edition][Cited 11 times ]

6. Jens Groth,  Rafail Ostrovsky,  Cryptography in the Multi-string Model, pp. 323 - 341, CRYPTO 2007.

[Electronic Edition][Cited 16 times ]

7. Jens Groth,  Steve Lu,  Verifiable Shuffle of Large Size Ciphertexts, pp. 377 - 392, PKC 2007.

[Electronic Edition][Cited 14 times ]

8. Jens Groth,  Rafail Ostrovsky,  Amit Sahai,  Perfect Non-interactive Zero Knowledge for NP, pp. 339 - 358, EUROCRYPT 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 100 times Red StarRed Star]

9. Jens Groth,  Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures, pp. 444 - 459, ASIACRYPT 2006.

[Electronic Edition][Cited 41 times ]

10. Jens Groth,  Rafail Ostrovsky,  Amit Sahai,  Non-interactive Zaps and New Techniques for NIZK, pp. 97 - 111, CRYPTO 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 35 times ]

11. Jens Groth,  Non-interactive Zero-Knowledge Arguments for Voting, pp. 467 - 482, ACNS 2005.

[Electronic Edition][Cited 30 times ]

12. Jens Groth,  Cryptography in Subgroups of Z, pp. 50 - 65, TCC 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 26 times ]

13. Jens Groth,  Evaluating Security of Voting Schemes in the Universal Composability Framework, pp. 46 - 60, ACNS 2004.

[Electronic Edition][Cited 14 times ]

14. Jens Groth,  Rerandomizable and Replayable Adaptive Chosen Ciphertext Attack Secure Cryptosystems, pp. 152 - 170, TCC 2004.

[Electronic Edition][Cited 11 times ]

15. Jens Groth,  Efficient Maximal Privacy in Boardroom Voting and Anonymous Broadcast, pp. 90 - 104, FC 2004.

[Electronic Edition][Cited 25 times ]

16. Jens Groth,  A Verifiable Secret Shuffle of Homomorphic Encryptions, pp. 145 - 160, PKC 2003.

[Electronic Edition][Cited 122 times Red StarRed Star]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...