Zero-knowledge proof

Results: 211



#Item
101Ciphertext indistinguishability / Oblivious transfer / Computational indistinguishability / Cryptographic hash function / Chosen-ciphertext attack / Zero-knowledge proof / Diffie–Hellman problem / RSA / Cryptography / Cryptographic protocols / Common reference string model

Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS Seung Geol Choi∗ Jonathan Katz†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-05-14 14:54:31
102Cryptographic protocols / Trapdoor function / Claw-free permutation / One-way function / Zero-knowledge proof / XTR / Mercurial / Permutation / Communications protocol / Cryptography / Public-key cryptography / Commitment scheme

Minimal Assumptions for Efficient Mercurial Commitments∗ Yevgeniy Dodis† Abstract Mercurial commitments were introduced by Chase et al. [8] and form a key building block for constructing zero-knowledge sets (introduc

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-11-30 14:18:39
103Cryptographic protocols / Probabilistic complexity theory / Complexity classes / Interactive proof system / Proof of knowledge / Zero-knowledge proof / IP / Soundness / Commitment scheme / Theoretical computer science / Applied mathematics / Computational complexity theory

Round-Optimal Zero-Knowledge Proofs of Knowledge for NP Li HongDa†1 , Feng DengGuo2 , Li Bao1 , Xu HaiXia1 1 State Key Lab of Information Security, Graduate University of Chinese Academy of Sciences, Beijing, C

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-15 09:42:20
104Commitment scheme / Zero-knowledge proof / Oblivious transfer / Secure two-party computation / Proof of knowledge / Communication complexity / IP / Polynomial / Homomorphic encryption / Cryptography / Cryptographic protocols / Secure multi-party computation

Efficient Set Operations in the Presence of Malicious Adversaries Carmit Hazay∗ Kobbi Nissim† May 4, 2010

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-05-04 07:57:36
105Cryptographic protocols / Public-key cryptography / Proof of knowledge / Zero-knowledge proof / Digital signature / Parity of a permutation / PP / NP / XTR / Cryptography / Theoretical computer science / Applied mathematics

Delegateable Signature Using Witness Indistinguishable and Witness Hiding Proofs Chunming Tang1,∗ Dingyi Pei1,2 Zhuojun Liu3

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-12-29 06:02:29
106Public-key cryptography / IP / One-way function / Communications protocol / Fuse / Cryptography / Homomorphic encryption / Zero-knowledge proof

On the Impossibility of Approximate Obfuscation and Applications to Resettable Cryptography Nir Bitansky∗ and Omer Paneth† Tel Aviv University and Boston University April 23, 2015 This is an out of date draft that is

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-23 15:21:41
107Zero-knowledge proof / Cryptographic hash functions / Cryptography / Polish State Railways / IP

Analysis of some natural variants of the PKP Algorithm Rodolphe LAMPE and Jacques PATARIN PRISM - University of Versailles In 1989, Adi Shamir [15] proposed a new zero-knowledge identication scheme

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-07-04 14:25:42
108Computing / Information / Secure multi-party computation / Zero-knowledge proof / Actor model / Communications protocol / Ciphertext indistinguishability / X Window System / Commitment scheme / Cryptographic protocols / Cryptography / Data

What Information is Leaked under Concurrent Composition?∗ Vipul Goyal Microsoft Research India and

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-04 11:22:52
109Information / Model theory / Proof of knowledge / Zero-knowledge proof / Structure / Homomorphism / IP / Communications protocol / Golden ratio / Cryptographic protocols / Data / Mathematics

Efficiency Limitations for Σ-Protocols for Group Homomorphisms ? (Full Version) Endre Bangerter1 , Jan Camenisch2 , and Stephan Krenn3 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-12-04 11:23:33
110Mathematics / Quantum complexity theory / Accumulator / Central processing unit / Zero-knowledge proof / Proof of knowledge / Polynomial / Function / NP / Cryptography / Cryptographic protocols / Applied mathematics

Zero-Knowledge Accumulators and Set Operations Esha Ghosh1 , Olga Ohrimenko2 , Dimitrios Papadopoulos3 , Roberto Tamassia1 and Nikos Triandopoulos4,3 1 Dept. of Computer Science, Brown University, Providence RI, USA esha

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-28 18:00:30
UPDATE