Zero-knowledge protocols are one of the fundamental con-cepts in modern cryptography and have countless applica-tions. However, after more than 30 years from their intro-duction, there are only very few languages (essentially those with a group structure) for which we can construct zero-knowledge protocols that are efficient enough to be used in practice. In this paper we address the problem of how to construct efficient zero-knowledge protocols for generic languages and we propose a protocol based on Yao’s garbled circuit tech-nique. The motivation for our work is that in many cryptographic applications it is useful to be able to prove efficiently state-ments of the form e.g., “I know x s.t. y = SHA-256(x) ” for a common input y (or other ...
The construction of zero-knowledge proofs can be greatly simplified if the protocol is only required...
We propose a general technique that allows improving the complexity of zero-knowledge protocols for ...
Crypto-computing is a set of well-known techniques for computing with encrypted data. The security o...
Zero-knowledge protocols are one of the fundamental concepts in modern cryptography and have countle...
Abstract In the last few years garbled circuits (GC) have been elevated from being merely a com-pone...
Zero-knowledge (ZK) protocols are undoubtedly among the central primitives in cryptography, lending ...
Zero-knowledge (ZK) protocols are undoubtedly among the central primitives in cryptography, lending ...
ABSTRACT We present a general construction of a zero-knowledge proof for an NP relation R(x, w) whic...
"Zero-knowledge arguments" is a fundamental cryptographic primitive which allows one polyn...
We present a general construction of a zero-knowledge proof for an NP relation R(x, w) which only ma...
We present a general construction of a zero-knowledge proof for an NP relation R(x,w) which only mak...
The material below covers two lectures on the beautiful and influential concept of zero-knowledge pr...
International audienceWe put forth a new framework for building pairing-based non-interactive zerokn...
Abstract. We propose a general technique that allows improving the complexity of zero-knowledge prot...
With the recent emergence of efficient zero-knowledge (ZK) proofs for general circuits, while effici...
The construction of zero-knowledge proofs can be greatly simplified if the protocol is only required...
We propose a general technique that allows improving the complexity of zero-knowledge protocols for ...
Crypto-computing is a set of well-known techniques for computing with encrypted data. The security o...
Zero-knowledge protocols are one of the fundamental concepts in modern cryptography and have countle...
Abstract In the last few years garbled circuits (GC) have been elevated from being merely a com-pone...
Zero-knowledge (ZK) protocols are undoubtedly among the central primitives in cryptography, lending ...
Zero-knowledge (ZK) protocols are undoubtedly among the central primitives in cryptography, lending ...
ABSTRACT We present a general construction of a zero-knowledge proof for an NP relation R(x, w) whic...
"Zero-knowledge arguments" is a fundamental cryptographic primitive which allows one polyn...
We present a general construction of a zero-knowledge proof for an NP relation R(x, w) which only ma...
We present a general construction of a zero-knowledge proof for an NP relation R(x,w) which only mak...
The material below covers two lectures on the beautiful and influential concept of zero-knowledge pr...
International audienceWe put forth a new framework for building pairing-based non-interactive zerokn...
Abstract. We propose a general technique that allows improving the complexity of zero-knowledge prot...
With the recent emergence of efficient zero-knowledge (ZK) proofs for general circuits, while effici...
The construction of zero-knowledge proofs can be greatly simplified if the protocol is only required...
We propose a general technique that allows improving the complexity of zero-knowledge protocols for ...
Crypto-computing is a set of well-known techniques for computing with encrypted data. The security o...