搜索结果: 1-15 共查到“军事学 Verifier”相关记录41条 . 查询时间(0.125 秒)
Reusable Designated-Verifier NIZKs for all NP from CDH
cryptographic protocols Zero-knowledge
2019/3/4
Non-interactive zero-knowledge proofs (NIZKs) are a fundamental cryptographic primitive. Despite a long history of research, we only know how to construct NIZKs under a few select assumptions, such as...
Designated-verifier pseudorandom generators, and their applications
non-interactive zero-knowledge computational Diffie-Hellman learning with errors
2019/3/4
We provide a generic construction of non-interactive zero-knowledge (NIZK) schemes. Our construction is a refinement of Dwork and Naor’s (FOCS 2000) implementation of the hidden bits model using verif...
New Constructions of Reusable Designated-Verifier NIZKs
cryptographic protocols Non-interactive zero-knowledge
2019/3/4
Non-interactive zero-knowledge arguments (NIZKs) for NP are an important cryptographic primitive, but we currently only have instantiations under a few specific assumptions. Notably, we are missing co...
Verifier-on-a-Leash: new schemes for verifiable delegated quantum computation, with quasilinear resources
Quantum cryptography Delegation of quantum computation Self-testing
2019/3/2
The problem of reliably certifying the outcome of a computation performed by a quantum device is rapidly gaining relevance. We present two protocols for a classical verifier to verifiably delegate a q...
Designated Verifier/Prover and Preprocessing NIZKs from Diffie-Hellman Assumptions
Non-interactive zero-knowledge proofs Diffie-Hellman assumptions Homomorphic signatures
2019/3/1
In a non-interactive zero-knowledge (NIZK) proof, a prover can non-interactively convince a verifier of a statement without revealing any additional information. Thus far, numerous constructions of NI...
On the Security of a Certificateless Strong Designated Verifier Signature Scheme
Certificateless cryptography Cryptanalysis Designated verifier signature
2018/11/8
Recently, Chen et al. proposed the first non-delegatable certificateless strong designated verifier signature scheme and claimed that their scheme achieves all security requirements. However, in this ...
In multi-prover interactive proofs, the verifier interrogates the provers and attempts to steal their knowledge. Other than that, the verifier's role has not been studied. Augmentation of the provers ...
An Efficiency-Preserving Transformation from Honest-Verifier Statistical Zero-Knowledge to Statistical Zero-Knowledge
statistical zero-knowledge honest-verifier statistical zero-knowledge instance-dependent commitment schemes
2018/3/6
We present an unconditional transformation from any honest-verifier statistical zero-knowledge (HVSZK) protocol to standard SZK that preserves round complexity and efficiency of both the verifier and ...
Efficient Designated-Verifier Non-Interactive Zero-Knowledge Proofs of Knowledge
Zero-knowledge proofs, Non-interactive proofs
2017/10/30
We propose a framework for constructing efficient designated-verifier non-interactive zero-knowledge proofs (DVNIZK) for a wide class of algebraic languages over abelian groups, under standard assumpt...
A Universal Designated Verifier Signature Scheme with Non-Delegatability in the Standard Model
Designated Verifier Signature Universal Designated Verifier Signature Non-Delegatability
2017/9/1
In a designated verifier signature (DVS) scheme a signer creates a signature which is only verifiable by a designated verifier. A DVS is a useful scheme for authenticating a signer without disturbing ...
A Novel Multi-factor ID-based Designated Verifier Signature scheme
cryptographic protocols digital signatures
2016/12/24
In a classic digital signature scheme, the global community is capable of verifying a signature. In a designated verifier scheme (DVS), only the designated verifier has this capability. In a classic D...
Code-based Strong Designated Verifier Signatures: Security Analysis and a New Construction
code-based signatures strong designated verifier signatures coding theory
2016/12/10
Strong designated verifier signatures make the message authenticated only to a designated person called the designated verifier while privacy of the signer's identity is preserved. This primitive is u...
Signer-Anonymous Designated-Verifier Redactable Signatures for Cloud-Based Data Sharing
redactable signatures designated-verifier group signatures
2016/12/7
Redactable signature schemes allow to black out predefined
parts of a signed message without affecting the validity of the signature,
and are therefore an important building block in privacy-enhanci...
Blind Password Registration for Verifier-based PAKE
blind password registration verifier-based PAKE
2016/5/9
We propose Blind Password Registration (BPR), a new class of cryptographic protocols that is instrumental for secure registration of client passwords at remote servers with additional protection again...
Lattice-based Group Signature Scheme with Verifier-local Revocation
group signature verifier-local revocation lattice-based cryptography
2016/1/26
Support of membership revocation is a desirable functionality for any group signature scheme.
Among the known revocation approaches, verifier-local revocation (VLR) seems to be the most flexible one,...