Carregant...
Tipus de document
Treball de fi de grauData de publicació
Llicència de publicació
Si us plau utilitzeu sempre aquest identificador per citar o enllaçar aquest document: https://hdl.handle.net/2445/221815
Elliptic curves, cryptographic proofs and signature schemes: a comprehensive analysis of the Pinocchio protocol and implementation frameworks
Títol de la revista
Autors
Director/Tutor
ISSN de la revista
Títol del volum
Recurs relacionat
Resum
This paper investigates the mathematical and cryptographic principles underlying elliptic curves and their critical role in modern secure communication systems. It begins with an exploration of elliptic curves and their group properties, emphasizing their utility in cryptography through problems like the discrete logarithm. The discussion transitions to the Pinocchio protocol, a zero-knowledge succinct non-interactive argument of knowledge (zk-SNARK), detailing its use of Rank-1 Constraint Systems (R1CS), Quadratic Arithmetic Programs (QAPs), and
cryptographic commitments. The final section delves into practical implementations, employing CIRCOM for circuit definition and testing, with specific applications to ECDSA and BLS signature schemes. Through this comprehensive approach, the paper bridges theoretical cryptographic advancements with practical implementation, offering insights into the efficiency, security, and application of elliptic curve-based protocols.
Descripció
Treballs Finals de Grau de Matemàtiques, Facultat de Matemàtiques, Universitat de Barcelona, Any: 2025, Director: Luis Victor Dieulefait
Matèries (anglès)
Citació
Col·leccions
Citació
LLAMAS GÓMEZ, Claudia. Elliptic curves, cryptographic proofs and signature schemes: a comprehensive analysis of the Pinocchio protocol and implementation frameworks. [consulta: 23 de gener de 2026]. [Disponible a: https://hdl.handle.net/2445/221815]