email ivandaimiaaudk Suppose we are given a proof of knowledge P in which a prover demonstrates that he knows a solution to a given problem instance Suppose also that we have a secret sharing scheme S on n participants Then under certain assumptions on P and S we show how to transform P into a witness indistinguishable protocol in which the prover demonstrates knowledge of the solution to a subset of n problem instances corresponding to a quali ed set of participants For example using a threshold scheme the prover can show that he knows at least d out of n solutions without revealing which d instances are involved If the instances are independently generated this can lead to witness hiding protocols even if P did not have this property ...
For various well-known proofs of knowledge, we address the problem of how much information a cheatin...
Abstract. The round complexity of interactive protocols is one of their most important complexity me...
Secret Sharing is a fundamental notion for secure cryptographic design. In a Secret Sharing protocol...
Suppose we are given a proof of knowledge P in which a prover demonstrates that he knows a solution ...
Suppose we are given a proof of knowledge P in which a prover demonstrates that he knows a solution ...
Proofs of partial knowledge allow a prover to prove knowledge of witnesses for k out of n instances ...
Zero-Knowledge Protocols and Witness Encryption are usually defined for NP relations. I show that th...
We propose a general technique that allows improving the complexity of zero-knowledge protocols for ...
In a proof of partial knowledge, introduced by Cramer, Damgård and Schoenmakers (CRYPTO 1994), a pro...
Abstract. We introduce a new notion called ℓ-isolated proofs of knowledge (ℓ-IPoK). These are proofs...
We study secret sharing schemes for general (non-threshold) access structures. A general secret shar...
Abstract. We propose a general technique that allows improving the complexity of zero-knowledge prot...
One of the central questions in Cryptography today is proving security of the protocols “on the Inte...
Broadcast and verifiable secret sharing (VSS) are central building blocks for secure multi-party com...
We introduce a new class of protocols called Proofs of Work or Knowledge (PoWorKs). In a PoWorK, a p...
For various well-known proofs of knowledge, we address the problem of how much information a cheatin...
Abstract. The round complexity of interactive protocols is one of their most important complexity me...
Secret Sharing is a fundamental notion for secure cryptographic design. In a Secret Sharing protocol...
Suppose we are given a proof of knowledge P in which a prover demonstrates that he knows a solution ...
Suppose we are given a proof of knowledge P in which a prover demonstrates that he knows a solution ...
Proofs of partial knowledge allow a prover to prove knowledge of witnesses for k out of n instances ...
Zero-Knowledge Protocols and Witness Encryption are usually defined for NP relations. I show that th...
We propose a general technique that allows improving the complexity of zero-knowledge protocols for ...
In a proof of partial knowledge, introduced by Cramer, Damgård and Schoenmakers (CRYPTO 1994), a pro...
Abstract. We introduce a new notion called ℓ-isolated proofs of knowledge (ℓ-IPoK). These are proofs...
We study secret sharing schemes for general (non-threshold) access structures. A general secret shar...
Abstract. We propose a general technique that allows improving the complexity of zero-knowledge prot...
One of the central questions in Cryptography today is proving security of the protocols “on the Inte...
Broadcast and verifiable secret sharing (VSS) are central building blocks for secure multi-party com...
We introduce a new class of protocols called Proofs of Work or Knowledge (PoWorKs). In a PoWorK, a p...
For various well-known proofs of knowledge, we address the problem of how much information a cheatin...
Abstract. The round complexity of interactive protocols is one of their most important complexity me...
Secret Sharing is a fundamental notion for secure cryptographic design. In a Secret Sharing protocol...