Anca Nitulescu

Anca Nitulescu
Protocol Labs · CryptoNetLab

Master of Research

About

15
Publications
829
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
146
Citations
Citations since 2017
13 Research Items
144 Citations
2017201820192020202120222023010203040
2017201820192020202120222023010203040
2017201820192020202120222023010203040
2017201820192020202120222023010203040
Introduction
Anca Nitulescu is a Cryptography Researcher based in Paris. They had their PhD at the Département d'Informatique, Ecole Normale Supérieure de Paris. Anca also did a postdoc at Aarhus University, Denmark.

Publications

Publications (15)
Chapter
Vector commitments (VC) are a cryptographic primitive that allows one to commit to a vector and then “open” some of its positions efficiently. Vector commitments are increasingly recognized as a central tool to scale highly decentralized networks of large size and whose content is dynamic. In this work, we examine the demands on the properties that...
Chapter
Zero-knowledge SNARKs (zk-SNARKs) are non-interactive proof systems with short and efficiently verifiable proofs that do not reveal anything more than the correctness of the statement. zk-SNARKs are widely used in decentralised systems to address privacy and scalability concerns.A major drawback of such proof systems in practice is the requirement...
Chapter
We show that three popular universal zero-knowledge SNARKs (Plonk, Sonic, and Marlin) are updatable SRS simulation extractable NIZKs and signatures of knowledge (SoK) out-of-the-box avoiding any compilation overhead.Towards this we generalize results for the Fiat–Shamir (FS) transformation, which turns interactive protocols into signature schemes,...
Chapter
Oblivious Polynomial Evaluation (OPE) schemes are interactive protocols between a sender with a private polynomial and a receiver with a private evaluation point where the receiver learns the evaluation of the polynomial in their point and no additional information. In this work, we introduce MyOPE, a “short-sighted” non-interactive polynomial eval...
Conference Paper
Full-text available
Ring signatures enable a signer to sign a message on behalf of a group anonymously, without revealing her identity. Similarly, threshold ring signatures allow several signers to sign the same message on behalf of a group; while the combined signature reveals that some threshold \(t \) of the group members signed the message, it does not leak anythi...
Chapter
Off-the-Record (OTR) messaging is a two-party message authentication protocol that also provides plausible deniability: there is no record that can later convince a third party what messages were actually sent. The challenge in group OTR, is to enable the sender to sign his messages so that group members can verify who sent a message (signatures sh...
Chapter
We consider the setting in which an untrusted server stores a collection of data and is asked to compute a function over it. In this scenario, we aim for solutions where the untrusted server does not learn information about the data and is prevented from cheating. This problem is addressed by verifiable and private delegation of computation, propos...
Chapter
Succinct non-interactive arguments (SNARGs) enable verifying NP computations with substantially lower complexity than that required for classical NP verification. In this work, we construct a zero-knowledge SNARG candidate that relies only on lattice-based assumptions which are claimed to hold even in the presence of quantum computers.
Thesis
The contributions detailed in this thesis focus on the design and the analysis of Succinct non-interactive arguments of knowledge, known as SNARKs. SNARKs enable a party with large computational resources to prove to a weaker party that a particular statement is true in an efficient way without further interaction and under a minimal communication...
Thesis
The contributions detailed in this thesis focus on the design and the analysis of Succinct non-interactive arguments of knowledge, known as SNARKs. SNARKs enable a party with large computational resources to prove to a weaker party that a particular statement is true in an efficient way without further interaction and under a minimal communication...
Conference Paper
Full-text available
Zero-knowledge SNARKs (zk-SNARKs) are non-interactive proof systems with short and efficiently verifiable proofs. They elegantly resolve the juxtaposition of individual privacy and public trust, by providing an efficient way of demonstrating knowledge of secret information without actually revealing it. To this day, zk-SNARKs are being used for del...
Conference Paper
In this work we study the feasibility of knowledge extraction for succinct non-interactive arguments of knowledge (SNARKs) in a scenario that, to the best of our knowledge, has not been analyzed before. While prior work focuses on the case of adversarial provers that may receive (statically generated) auxiliary information, here we consider the sce...
Conference Paper
Password-protected secret sharing (PPSS) schemes allow a user to publicly share its high-entropy secret across different servers and to later recover it by interacting with some of these servers using only his password without requiring any authenticated data. In particular, this secret will remain safe as long as not too many servers get corrupted...

Network

Cited By