Non-interactive zero-knowledge proof

Results: 39



#Item
21Concurrent/Resettable Zero-Knowledge With Concurrent Soundness in the Bare Public-Key Model and Its Applications Yunlei Zhao‡ Abstract In this work, we investigate concurrent knowledge-extraction (CKE) and concurrent n

Concurrent/Resettable Zero-Knowledge With Concurrent Soundness in the Bare Public-Key Model and Its Applications Yunlei Zhao‡ Abstract In this work, we investigate concurrent knowledge-extraction (CKE) and concurrent n

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-03-07 05:44:25
22The Statistical Zero-knowledge Proof for Blum Integer Based on Discrete Logarithm∗ Chunming Tang  †

The Statistical Zero-knowledge Proof for Blum Integer Based on Discrete Logarithm∗ Chunming Tang †

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-11-03 03:50:58
23A Note on Constant-Round Zero-Knowledge Proofs of Knowledge∗ Yehuda Lindell† September 24, 2012 Abstract In this note, we show the existence of constant-round computational zero-knowledge proofs of knowledge for all

A Note on Constant-Round Zero-Knowledge Proofs of Knowledge∗ Yehuda Lindell† September 24, 2012 Abstract In this note, we show the existence of constant-round computational zero-knowledge proofs of knowledge for all

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-09-24 15:21:39
24This Extended Abstract appears in the Proceedings of the 17th International Conference on Practice and Theory in Public-Key Cryptography (PKC ’[removed] – 28 March 2014, Buenos Aires, Argentina) Hugo Krawczyk Ed., Spri

This Extended Abstract appears in the Proceedings of the 17th International Conference on Practice and Theory in Public-Key Cryptography (PKC ’[removed] – 28 March 2014, Buenos Aires, Argentina) Hugo Krawczyk Ed., Spri

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-24 06:04:31
25Witness Indistinguishable and Witness Hiding Protocols Uriel Feige, Adi Shamir Department of Applied Mathematics The Weizmann Institute of Science Rehovot 76100, Israel

Witness Indistinguishable and Witness Hiding Protocols Uriel Feige, Adi Shamir Department of Applied Mathematics The Weizmann Institute of Science Rehovot 76100, Israel

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2004-04-12 23:16:13
26ZKPDL: A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash Sarah Meiklejohn University of California, San Diego smeiklej@ cs.ucsd.edu

ZKPDL: A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash Sarah Meiklejohn University of California, San Diego smeiklej@ cs.ucsd.edu

Add to Reading List

Source URL: www0.cs.ucl.ac.uk

Language: English - Date: 2014-09-03 04:48:12
27Full version of an extended abstract published in Proceedings of Eurocrypt 2012, Springer-Verlag, 2012. Available from the IACR Cryptology ePrint Archive as Report[removed]Malleable Proof Systems and Applications Melis

Full version of an extended abstract published in Proceedings of Eurocrypt 2012, Springer-Verlag, 2012. Available from the IACR Cryptology ePrint Archive as Report[removed]Malleable Proof Systems and Applications Melis

Add to Reading List

Source URL: www0.cs.ucl.ac.uk

Language: English - Date: 2014-09-03 04:47:41
28An Extension of the Groth-Sahai Proof System Sarah Meiklejohn [removed] Sc.B., Brown University, 2008  Thesis Advisor: Anna Lysyanskaya

An Extension of the Groth-Sahai Proof System Sarah Meiklejohn [removed] Sc.B., Brown University, 2008 Thesis Advisor: Anna Lysyanskaya

Add to Reading List

Source URL: www0.cs.ucl.ac.uk

Language: English - Date: 2014-09-03 04:47:55
29Noname manuscript No. (will be inserted by the editor) One-Round Deniable Key Exchange with Perfect Forward Security Weiqiang Wen · Libin Wang · Min Xie

Noname manuscript No. (will be inserted by the editor) One-Round Deniable Key Exchange with Perfect Forward Security Weiqiang Wen · Libin Wang · Min Xie

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-25 04:54:02
30Construction of a Non-Malleable Encryption Scheme from Any Semantically Secure One Rafael Pass1 , abhi shelat2 , and Vinod Vaikuntanathan3 1  Cornell University

Construction of a Non-Malleable Encryption Scheme from Any Semantically Secure One Rafael Pass1 , abhi shelat2 , and Vinod Vaikuntanathan3 1 Cornell University

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2010-02-04 10:24:17