<--- Back to Details
First PageDocument Content
Cryptography / Computational complexity theory / Zero-knowledge proof / Zero knowledge / Interactive proof system / IP / NP / Cryptographic protocol / Proof of knowledge / Oblivious transfer
Date: 2008-09-12 11:33:08
Cryptography
Computational complexity theory
Zero-knowledge proof
Zero knowledge
Interactive proof system
IP
NP
Cryptographic protocol
Proof of knowledge
Oblivious transfer

Cryptology and Its Applications Nordic Research Training course, Bergen Zero knowledge and some applications Helger Lipmaa

Add to Reading List

Source URL: kodu.ut.ee

Download Document from Source Website

File Size: 219,35 KB

Share Document on Facebook

Similar Documents

On the Feasibility of Extending Oblivious Transfer∗ Yehuda Lindell Hila Zarosim  Dept. of Computer Science

On the Feasibility of Extending Oblivious Transfer∗ Yehuda Lindell Hila Zarosim Dept. of Computer Science

DocID: 1v80m - View Document

Adaptive Zero-Knowledge Proofs and Adaptively Secure Oblivious Transfer∗ Yehuda Lindell Hila Zarosim

Adaptive Zero-Knowledge Proofs and Adaptively Secure Oblivious Transfer∗ Yehuda Lindell Hila Zarosim

DocID: 1uUpb - View Document

INFOCOMMUNICATIONS JOURNAL  Oblivious Transfer with Verification Oblivious Oblivious

INFOCOMMUNICATIONS JOURNAL Oblivious Transfer with Verification Oblivious Oblivious

DocID: 1uO7u - View Document

Chemical	
  OT:	
    On	
  the	
  (Im)possibility	
  of	
  Basing	
  Oblivious	
  Transfer	
  on	
  Chemical	
   Assump>ons	
    Bernardo	
  David	
  

Chemical  OT:   On  the  (Im)possibility  of  Basing  Oblivious  Transfer  on  Chemical   Assump>ons   Bernardo  David  

DocID: 1tRD2 - View Document

Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer∗ Yehuda Lindell† Benny Pinkas‡

Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer∗ Yehuda Lindell† Benny Pinkas‡

DocID: 1tjPL - View Document