搜索结果: 151-165 共查到“知识库 军事学 zero knowledge”相关记录196条 . 查询时间(0.075 秒)
Composition of Zero-Knowledge Proofs with Efficient Provers
Zero-Knowledge Proofs Efficient Provers
2009/12/29
We revisit the composability of different forms of zero-knowledge proofs when the honest
prover strategy is restricted to be polynomial time (given an appropriate auxiliary input).
Precise Bounded-Concurrent Zero-Knowledge in Almost Constant Rounds
Zero-Knowledge Precise Zero-Knowledge Concurrent Zero-Knowledge
2009/9/27
Precise concurrent zero-knowledge is a new notion introduced by Pandey et al. [23] in
Eurocrypt'08 (which generalizes the work on precise zero-knowledge by Micali and Pass [19] in
STOC'06). This not...
Precise Bounded-Concurrent Zero-Knowledge in Almost Constant Rounds
Zero-Knowledge Precise Zero-Knowledge Concurrent Zero-Knowledge Interactive Proofs and Arguments
2009/9/22
Precise concurrent zero-knowledge is a new notion introduced by Pandey et al. [23] in
Eurocrypt'08 (which generalizes the work on precise zero-knowledge by Micali and Pass [19] in
STOC'06). This not...
Precise Time and Space Simulatable Zero-Knowledge
Zero-Knowledge Precise Zero-Knowledge Proofs of Knowledge
2009/9/11
Traditionally, the definition of zero-knowledge states that an interactive proof of x 2 L
provides zero (additional) knowledge if the view of any polynomial-time verifier can be recon-
structed by a...
Sub-linear Size Pairing-based Non-interactive Zero-Knowledge Arguments
Sub-linear size non-interactive zero-knowledge arguments circuit satisfiability pairing-based cryptography
2009/8/18
We construct non-interactive zero-knowledge arguments for circuit satisfiability and arithmetic circuits
with perfect completeness, perfect zero-knowledge and computational (co-)soundness. The non-in...
Adaptive Zero-Knowledge Proofs and Adaptively Secure Oblivious Transfer
Adaptive Zero-Knowledge Proofs Adaptively Secure Oblivious Transfer
2009/8/7
In the setting of secure computation, a set of parties wish to securely compute some function
of their inputs, in the presence of an adversary. The adversary in question may be static
(meaning that ...
Bringing Zero-Knowledge Proofs of Knowledge to Practice
Bringing Zero-Knowledge Proofs DAA TCG
2009/6/12
Efficient zero-knowledge proofs of knowledge (ZK-PoK) are
basic building blocks of many practical cryptographic applications such
as identification schemes, group signatures, and secure multiparty c...
Resettably-Sound Resettable Zero Knowledge Arguments for NP
Resettably-Sound Resettable Zero Knowledge Arguments NP non-black-box
2009/6/11
We construct resettably-sound resettable zero knowledge arguments for NP based
on standard hardness assumption (the existence of claw-free permutations) in the plain model.
This proves the simultane...
Round-Optimal Zero-Knowledge Proofs of Knowledge for NP
Round-Optimal Zero-Knowledge Proofs NP Hamiltonian Cycle
2009/6/10
It is well known that all the known black-box zero-knowledge proofs of knowledge for NP are nonconstant-
round. Whether there exit constant-round black-box zero-knowledge proofs of knowledge for
all...
Automatic Generation of Sound Zero-Knowledge Protocols
Zero-Knowledge Protocol Compiler Language Design
2009/6/10
Efficient zero-knowledge proofs of knowledge (ZK-PoK) are basic building blocks of many
practical cryptographic applications such as identification schemes, group signatures, and secure multiparty
c...
Identification and Privacy: Zero-Knowledge is not Enough
Identification Privacy: Zero-Knowledge
2009/6/4
At first glance, privacy and zero-knowledgeness seem to be
similar properties. A scheme is private when no information is revealed
on the prover and in a zero-knowledge scheme, communications should...
Computational Soundness of Symbolic Zero-Knowledge Proofs Against Active Attackers
Computational Soundness Symbolic Zero-Knowledge Proofs Active Attackers
2009/6/3
The abstraction of cryptographic operations by term algebras,
called Dolev-Yao models, is essential in almost all
tool-supported methods for proving security protocols. Recently
significant progres...
Interactive and Noninteractive Zero Knowledge are Equivalent in the Help Model
cryptography computational complexity noninteractive zero-knowledge proofs
2009/6/2
We show that interactive and noninteractive zero-knowledge are equivalent in the `help
model' of Ben-Or and Gutfreund (J. Cryptology, 2003). In this model, the shared reference
string is generated b...
Efficient Zero-Knowledge Proofs of Knowledge Without Intractability Assumptions
Efficient Zero-Knowledge Proofs Intractability Assumptions
2009/4/17
Efficient Zero-Knowledge Proofs of Knowledge Without Intractability Assumptions.
Concurrent Zero-Knowledge in Poly-logarithmic Rounds
Concurrent Zero-Knowledge Poly-logarithmic Rounds
2009/4/17
A proof is concurrent zero-knowledge if it remains zero-knowledge when run in an
asynchronous environment, such as the Internet. It is known that zero-knowledge is
not necessarily preserved in such ...