| Document Date: 2013-06-17 13:32:36 Open Document File Size: 577,01 KBShare Result on Facebook
Company IBM / Offthe / ZKCrypt / Microsoft / / Currency pence / USD / / / Event FDA Phase / / Facility pipeline of ZKCrypt / / IndustryTerm verifier algorithms / security-sensitive applications / real-world identitymanagement systems / Σ-protocol / simulator algorithm / low-level protocol / compilation chain / user-centric identity management / instant messaging protocols / mathematical machinery / auxiliary algorithms / relation generation algorithm / level protocol / Σφ protocol / Σ-protocols / knowledge extractor algorithm / cryptographic protocols / anonymous credential systems / formal verification tools / formal verification tool / consumer devices / arbitrary Σ-protocols / extractor algorithm / trusted computing base / Σexp protocols / verification technologies / attribute-based credential systems / credential systems / suitable Σ-protocol / cartesian product / generated optimized protocol / / Organization Univ. of Appl / Paper / US Federal Reserve / Universidade do Minho / DE V / / Person Bern Univ / Almeida Manuel Barbosa Endre Bangerter Universidade / Santiago Zanella Béguelin / José Bacelar Almeida Manuel Barbosa / / Position extractor / simulator and special extractor / knowledge extractor / special extractor / Coq proof assistant / representative / / Product Rres / G1 / r2 / R0 / P01 / V0 / P1 / P2 / / ProgrammingLanguage Java / R / C / / Technology high-level protocol / two-party protocol / Translate algorithm / instant messaging protocols / Σφ protocol / extractor algorithm / verifier algorithms / knowledge extractor algorithm / verification technologies / ΣGSP protocol / Recover algorithm / auxiliary algorithms / resulting protocol / Cryptography / arbitrary Σ-protocols / two-party protocols / PPT algorithm / matching algorithm / Java / ZKPoK protocols / relation generation algorithm / suitable Σ-protocol / simulator algorithm / ZK-PoK protocol / promising enabling technology / generated optimized protocol / simulation / 3.2 Zero-Knowledge Proofs All ZK-PoK protocols / Recover algorithms / practically relevant Σ-protocols / Σexp protocols / low-level protocol / gui / /
SocialTag |