Often the core difficulty in designing zero-knowledge protocols arises from having to consider every possible cheating verifier trying to extract additional information. We here consider a compiler which transforms protocols proven secure only with respect to the honest verifier into protocols which are secure against any (even cheating) verifier. Such a compiler, which preserves the zero-knowledge property of a statistically or computationally secure protocol was first proposed in [BMO] based on Discrte Logarithm problem. In this paper, we show how such a compiler could be constructed based on any one-way permutation using the recent method of interactive hashing [OVY-91]. This applies to both statistically and computationally secure proto...
We present the design and implementation of a compiler that automatically generates protocols that p...
"Zero-knowledge arguments" is a fundamental cryptographic primitive which allows one polyn...
Secure computation enables a set of mutually distrustful parties to collaboratively compute a public...
In Crypto93, Damgard showed that any constant-round protocol in which the veri er sends only indepen...
Interactive hashing, introduced by Naor et al. [NOVY98], plays an important role in many crypto-grap...
AbstractA perfect zero-knowledge interactive protocol allows a prover to convince a verifier of the ...
Developers building cryptography into security-sensitive applications face a daunting task. Not only...
One of the important challenges when designing and analyzing cryptographic protocols is the enforcem...
Crypto-computing is a set of well-known techniques for computing with encrypted data. The security o...
We use interactive hashing to achieve the most efficient OT protocol to date based solely on the ass...
Privacy preserving protocols typically involve the use of Zero Knowledge (ZK) proofs, which allow a ...
Zero-knowledge protocols are one of the fundamental con-cepts in modern cryptography and have countl...
Zero-Knowledge Protocols and Witness Encryption are usually defined for NP relations. I show that th...
We suggest an honest verifier zero-knowledge argument for the correctness of a shuffle of homomorphi...
In this thesis, we study zero-knowledge proofs, a cryptographic primitive that allows to prove a sta...
We present the design and implementation of a compiler that automatically generates protocols that p...
"Zero-knowledge arguments" is a fundamental cryptographic primitive which allows one polyn...
Secure computation enables a set of mutually distrustful parties to collaboratively compute a public...
In Crypto93, Damgard showed that any constant-round protocol in which the veri er sends only indepen...
Interactive hashing, introduced by Naor et al. [NOVY98], plays an important role in many crypto-grap...
AbstractA perfect zero-knowledge interactive protocol allows a prover to convince a verifier of the ...
Developers building cryptography into security-sensitive applications face a daunting task. Not only...
One of the important challenges when designing and analyzing cryptographic protocols is the enforcem...
Crypto-computing is a set of well-known techniques for computing with encrypted data. The security o...
We use interactive hashing to achieve the most efficient OT protocol to date based solely on the ass...
Privacy preserving protocols typically involve the use of Zero Knowledge (ZK) proofs, which allow a ...
Zero-knowledge protocols are one of the fundamental con-cepts in modern cryptography and have countl...
Zero-Knowledge Protocols and Witness Encryption are usually defined for NP relations. I show that th...
We suggest an honest verifier zero-knowledge argument for the correctness of a shuffle of homomorphi...
In this thesis, we study zero-knowledge proofs, a cryptographic primitive that allows to prove a sta...
We present the design and implementation of a compiler that automatically generates protocols that p...
"Zero-knowledge arguments" is a fundamental cryptographic primitive which allows one polyn...
Secure computation enables a set of mutually distrustful parties to collaboratively compute a public...