Zero-knowledge proof

Results: 211



#Item
71Secure multi-party computation / Homomorphic encryption / Zero-knowledge proof / IP / RSA / Cryptography / Cryptographic protocols / Public-key cryptography

Guaranteeing Correctness in Privacy-Friendly Outsourcing by Certificate Validation Berry Schoenmakers and Meilof Veeningen Eindhoven University of Technology, The Netherlands {berry@win.,m.veeningen@}tue.nl

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-15 07:25:57
72Random oracle / Pseudorandom generator / One-way function / Pseudorandom function family / Zero-knowledge proof / Oracle machine / Feistel cipher / Cryptography / Pseudorandomness / Ciphertext indistinguishability

Limits on the Power of Indistinguishability Obfuscation and Functional Encryption Gilad Asharov∗ Gil Segev∗

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-16 07:03:25
73Probabilistic complexity theory / Cryptographic protocols / Computational complexity theory / Complexity classes / Zero-knowledge proof / Interactive proof system / IP / Commitment scheme / NP / Theoretical computer science / Applied mathematics / Cryptography

How to Go Beyond the Black-Box Simulation Barrier Boaz Barak∗ December 30, 2008 Abstract The simulation paradigm is central to cryptography. A simulator is an algorithm that tries

Add to Reading List

Source URL: www.boazbarak.org

Language: English - Date: 2011-10-10 23:51:40
74Homomorphic encryption / Post-quantum cryptography / Learning with errors / Quantum computer / Zero-knowledge proof / Public-key cryptography / RSA / Random self-reducibility / Oblivious transfer / Cryptography / Lattice-based cryptography / Lattice problem

Cryptography from Post-Quantum Assumptions Raza Ali Kazmi Doctor of Philosophy

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-18 18:23:29
75Zero-knowledge proof / Adversary model / Advantage / IP / Public-key cryptography / Communications protocol / Malleability / Cryptography / Cryptographic protocols / Commitment scheme

Constant-Round Coin-Tossing With a Man in the Middle or Realizing the Shared Random String Model Boaz Barak∗ May 19, 2008

Add to Reading List

Source URL: www.boazbarak.org

Language: English - Date: 2011-10-10 23:51:33
76Applied mathematics / Mathematics / Complexity classes / Metalogic / Zero-knowledge proof / Soundness / IP / NP / Completeness / Theoretical computer science / Cryptographic protocols / Proof theory

Making Σ-Protocols Non-Interactive without Random Oracles Pyrros Chaidos, Jens Groth University College London

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2015-03-27 08:17:32
77IP / Homomorphic encryption / Zero-knowledge proof / NP / One-way function / Cryptography / Applied mathematics / Cryptographic protocols

ON NON-BLACK-BOX SIMULATION AND THE IMPOSSIBILITY OF APPROXIMATE OBFUSCATION ∗ NIR BITANSKY† AND OMER PANETH‡ Abstract. The introduction of a non-black-box simulation technique by Barak (FOCShas been a major

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-22 10:26:13
78Universal composability / Secure multi-party computation / Information-theoretic security / Zero-knowledge proof / Communications protocol / Actor model / Cryptography / Cryptographic protocols / Secure two-party computation

Information-Theoretically Secure Protocols and Security Under Composition∗ Eyal Kushilevitz† Department of Computer Science Technion Israel Institute of Technology Haifa 32000, Israel.

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-12-20 09:14:45
79Computational complexity theory / Zero-knowledge proof / Proof of knowledge / IP / Soundness / NP / Quadratic residue / Probabilistic method / Mathematical proof / Theoretical computer science / Cryptography / Cryptographic protocols

Lecture 17 - Zero Knowledge Proofs Boaz Barak April 5, 2010 Review connections between: pseudorandom generators, one-way functions, pseudorandom functions, CPA secure symmetric encryption, message authentication codes, C

Add to Reading List

Source URL: www.cs.princeton.edu

Language: English - Date: 2010-04-05 00:17:40
80Verifiable secret sharing / Gödel Prize / Interactive proof system / Claude Crépeau / Pseudorandom function family / Probabilistic encryption / Oblivious transfer / Zero-knowledge proof / Provable security / Cryptography / Cryptographic protocols / Silvio Micali

Curriculum Vitae Silvio Micali Ford Professor of Engineering Electrical Engineering and Computer Science Department Stata Center, Room G644, 32 Vassar Street, Cambridge, MA5949

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2015-04-22 20:29:48
UPDATE