Back to Results
First PageMeta Content
Proof of knowledge / Finite fields / IP / Zero-knowledge proof / Random oracle / NP / XTR / MQV / Cryptography / Cryptographic protocols / Cryptographic hash functions


An Efficient Identification Protocol and the Knowledge-of-Exponent Assumption J. Wu∗ and D.R. Stinson† David R. Cheriton School of Computer Science University of Waterloo, Waterloo, ON, Canada {j32wu, dstinson}@uwate
Add to Reading List

Document Date: 2008-05-15 09:30:41


Open Document

File Size: 167,36 KB

Share Result on Facebook

City

Berlin / Heidelberg / London / /

Company

Fiat / /

Country

Canada / United Kingdom / /

/

Event

FDA Phase / /

Facility

Computer Science University of Waterloo / /

IndustryTerm

polynomial-time algorithms / public key systems / identification protocols / internet communication model / decryption algorithm / identification protocol / secure hardware / zeroknowledge protocols / agreement protocol / zero-knowledge identification protocol / /

Organization

University of Waterloo / Knowledge-of-Exponent Assumption J. Wu∗ and D.R. Stinson† David R. Cheriton School / /

Person

Ai / /

Position

extractor / editor / /

Product

Franklin / KEA1 / /

ProvinceOrState

New York / /

PublishedMedium

Journal of Cryptology / Lecture Notes in Computer Science / /

Technology

encryption / Identification protocols / Stinson-Wu protocol / 2-flow zero-knowledge identification protocol / PPT algorithm / public key / artificial intelligence / 4 Algorithm / polynomial-time algorithms / 3-round zeroknowledge protocols / designing identification protocols / key agreement protocol / encryption system / 2.2 Protocol / identification protocol / private key / 1 Introduction An identification protocol / secret key / plaintext-aware public-key encryption / simulation / html / decryption algorithm / interactive protocol / /

URL

http /

SocialTag