Carregant...
Miniatura

Tipus de document

Treball de fi de grau

Data de publicació

Llicència de publicació

cc-by-nc-nd (c) Claudia Llamas Gómez, 2025
Si us plau utilitzeu sempre aquest identificador per citar o enllaçar aquest document: https://hdl.handle.net/2445/221815

Elliptic curves, cryptographic proofs and signature schemes: a comprehensive analysis of the Pinocchio protocol and implementation frameworks

Títol de la revista

ISSN de la revista

Títol del volum

Recurs relacionat

Resum

This paper investigates the mathematical and cryptographic principles underlying elliptic curves and their critical role in modern secure communication systems. It begins with an exploration of elliptic curves and their group properties, emphasizing their utility in cryptography through problems like the discrete logarithm. The discussion transitions to the Pinocchio protocol, a zero-knowledge succinct non-interactive argument of knowledge (zk-SNARK), detailing its use of Rank-1 Constraint Systems (R1CS), Quadratic Arithmetic Programs (QAPs), and cryptographic commitments. The final section delves into practical implementations, employing CIRCOM for circuit definition and testing, with specific applications to ECDSA and BLS signature schemes. Through this comprehensive approach, the paper bridges theoretical cryptographic advancements with practical implementation, offering insights into the efficiency, security, and application of elliptic curve-based protocols.

Descripció

Treballs Finals de Grau de Matemàtiques, Facultat de Matemàtiques, Universitat de Barcelona, Any: 2025, Director: Luis Victor Dieulefait

Citació

Citació

LLAMAS GÓMEZ, Claudia. Elliptic curves, cryptographic proofs and signature schemes: a comprehensive analysis of the Pinocchio protocol and implementation frameworks. [consulta: 23 de gener de 2026]. [Disponible a: https://hdl.handle.net/2445/221815]

Exportar metadades

JSON - METS

Compartir registre