Back to Results
First PageMeta Content
Computational complexity theory / Zero-knowledge proof / Proof of knowledge / IP / Soundness / NP / Quadratic residue / Probabilistic method / Mathematical proof / Theoretical computer science / Cryptography / Cryptographic protocols


Lecture 17 - Zero Knowledge Proofs Boaz Barak April 5, 2010 Review connections between: pseudorandom generators, one-way functions, pseudorandom functions, CPA secure symmetric encryption, message authentication codes, C
Add to Reading List

Document Date: 2010-04-05 00:17:40


Open Document

File Size: 210,21 KB

Share Result on Facebook

Company

Pepsi / /

Event

FDA Phase / /

IndustryTerm

non-interactive algorithm / basic protocol / cryptographic protocols / identification protocol / cryptographic protocol / unsound proof systems / /

Person

Bob / Boaz Barak / Alice / /

Position

CPA / knowledge extractor / model the strategy / /

Product

Bob / /

ProgrammingLanguage

L / /

Technology

secure symmetric encryption / non-interactive algorithm / secure public key encryption / basic protocol / cryptographic protocol / following protocol / Diffie-Hellman key exchange protocol / identification protocol / cryptographic protocols / two interactive algorithms / /

SocialTag