Back to Results
First PageMeta Content
Applied mathematics / Proof of knowledge / Zero-knowledge proof / IP / Communications protocol / Vehicle Identification Number / Formal verification / NP / XTR / Theoretical computer science / Cryptography / Cryptographic protocols


Full Proof Cryptography: Verifiable Compilation of Efficient Zero-Knowledge Protocols José Bacelar Almeida Manuel Barbosa
Add to Reading List

Document Date: 2013-06-17 13:32:36


Open Document

File Size: 577,01 KB

Share Result on Facebook

Company

IBM / Offthe / ZKCrypt / Microsoft / /

Currency

pence / USD / /

/

Event

FDA Phase / /

Facility

pipeline of ZKCrypt / /

IndustryTerm

verifier algorithms / security-sensitive applications / real-world identitymanagement systems / Σ-protocol / simulator algorithm / low-level protocol / compilation chain / user-centric identity management / instant messaging protocols / mathematical machinery / auxiliary algorithms / relation generation algorithm / level protocol / Σφ protocol / Σ-protocols / knowledge extractor algorithm / cryptographic protocols / anonymous credential systems / formal verification tools / formal verification tool / consumer devices / arbitrary Σ-protocols / extractor algorithm / trusted computing base / Σexp protocols / verification technologies / attribute-based credential systems / credential systems / suitable Σ-protocol / cartesian product / generated optimized protocol / /

Organization

Univ. of Appl / Paper / US Federal Reserve / Universidade do Minho / DE V / /

Person

Bern Univ / Almeida Manuel Barbosa Endre Bangerter Universidade / Santiago Zanella Béguelin / José Bacelar Almeida Manuel Barbosa / /

Position

extractor / simulator and special extractor / knowledge extractor / special extractor / Coq proof assistant / representative / /

Product

Rres / G1 / r2 / R0 / P01 / V0 / P1 / P2 / /

ProgrammingLanguage

Java / R / C / /

Technology

high-level protocol / two-party protocol / Translate algorithm / instant messaging protocols / Σφ protocol / extractor algorithm / verifier algorithms / knowledge extractor algorithm / verification technologies / ΣGSP protocol / Recover algorithm / auxiliary algorithms / resulting protocol / Cryptography / arbitrary Σ-protocols / two-party protocols / PPT algorithm / matching algorithm / Java / ZKPoK protocols / relation generation algorithm / suitable Σ-protocol / simulator algorithm / ZK-PoK protocol / promising enabling technology / generated optimized protocol / simulation / 3.2 Zero-Knowledge Proofs All ZK-PoK protocols / Recover algorithms / practically relevant Σ-protocols / Σexp protocols / low-level protocol / gui / /

SocialTag