军事学 >>> 军事学
搜索结果: 151-165 共查到知识库 军事学 zero knowledge相关记录196条 . 查询时间(0.075 秒)
We revisit the composability of different forms of zero-knowledge proofs when the honest prover strategy is restricted to be polynomial time (given an appropriate auxiliary input).
Precise concurrent zero-knowledge is a new notion introduced by Pandey et al. [23] in Eurocrypt'08 (which generalizes the work on precise zero-knowledge by Micali and Pass [19] in STOC'06). This not...
Precise concurrent zero-knowledge is a new notion introduced by Pandey et al. [23] in Eurocrypt'08 (which generalizes the work on precise zero-knowledge by Micali and Pass [19] in STOC'06). This not...
Traditionally, the definition of zero-knowledge states that an interactive proof of x 2 L provides zero (additional) knowledge if the view of any polynomial-time verifier can be recon- structed by a...
We construct non-interactive zero-knowledge arguments for circuit satisfiability and arithmetic circuits with perfect completeness, perfect zero-knowledge and computational (co-)soundness. The non-in...
In the setting of secure computation, a set of parties wish to securely compute some function of their inputs, in the presence of an adversary. The adversary in question may be static (meaning that ...
Efficient zero-knowledge proofs of knowledge (ZK-PoK) are basic building blocks of many practical cryptographic applications such as identification schemes, group signatures, and secure multiparty c...
We construct resettably-sound resettable zero knowledge arguments for NP based on standard hardness assumption (the existence of claw-free permutations) in the plain model. This proves the simultane...
It is well known that all the known black-box zero-knowledge proofs of knowledge for NP are nonconstant- round. Whether there exit constant-round black-box zero-knowledge proofs of knowledge for all...
Efficient zero-knowledge proofs of knowledge (ZK-PoK) are basic building blocks of many practical cryptographic applications such as identification schemes, group signatures, and secure multiparty c...
At first glance, privacy and zero-knowledgeness seem to be similar properties. A scheme is private when no information is revealed on the prover and in a zero-knowledge scheme, communications should...
The abstraction of cryptographic operations by term algebras, called Dolev-Yao models, is essential in almost all tool-supported methods for proving security protocols. Recently significant progres...
We show that interactive and noninteractive zero-knowledge are equivalent in the `help model' of Ben-Or and Gutfreund (J. Cryptology, 2003). In this model, the shared reference string is generated b...
A proof is concurrent zero-knowledge if it remains zero-knowledge when run in an asynchronous environment, such as the Internet. It is known that zero-knowledge is not necessarily preserved in such ...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...