Back to Results
First PageMeta Content
Deniable encryption / Deniable authentication / ID-based encryption / Digital signature / Commitment scheme / Zero-knowledge proof / RSA / Integrated Encryption Scheme / Index of cryptography articles / Cryptography / Public-key cryptography / Cryptographic protocols


Deniable Ring Authentication∗ Moni Naor Weizmann Institute of Science Rehovot 76100, Israel [removed]
Add to Reading List

Document Date: 2002-06-03 03:07:12


Open Document

File Size: 246,64 KB

Share Result on Facebook

Country

Israel / /

Currency

pence / /

/

Facility

Deniable Ring Authentication∗ Moni Naor Weizmann Institute of Science Rehovot / /

IndustryTerm

indistinguishable protocols / deniable ring authentication protocol / zero-knowledge protocols / authentication protocol / involved solution / decryption device / assignment protocol / executed protocols / generation protocol / e - commerce / post-processing mode / online verifier / interactive authenticated protocol / reconstruction algorithm / /

Organization

S. / EU Program IST Frontier Foundation / Deniable Ring Authentication∗ Moni Naor Weizmann Institute of Science Rehovot / Alice / Crypto’2002 Program Committee / EFF1 / /

Person

Rabin / David Chaum / Van Antwerpen / /

Position

manager sets / group manager / representative / /

Technology

encryption / authentication protocol / 1 Introduction An authentication protocol / cryptography / public key / public-key encryption / 3.1 Encryption / 4 Some Background Protocols / PKI / concurrently executed protocols / ring authentication protocol / encryption system / key generation protocol / key assignment protocol / interactive authenticated protocol / two protocols / zero-knowledge protocols / secret key / reconstruction algorithm / main protocol / digital signature / 1 encryption / Deniable Ring Authentication protocol / Public-Key Infrastructure / interactive protocol / /

SocialTag