In identification protocols with public verifier coins (like Fiat-Shamir), a passive adversary watching the communication gains information intended only for the verifier. On the other hand, private coin protocols with fewer than three rounds cannot be zero-knowledge. In this paper, we introduce the notion of bounded-prover zero-knowledge proofs which require only two rounds and can be considered perfectly zero-knowledge under certain intractibility assumptions. Specifically, we exploit the gap between two computational problems to achieve zero-knowledge in a dishonest verifier scenario. Our example is based on the apparant intractibility of the Linear Diffie-Hellman Problem in bilinear maps. As a natural extension of the single user identi...
International audienceWe provide a generic construction of non-interactive zero-knowledge (NIZK) sch...
This paper presents two transformations of public-coin/Arthur-Merlin proof sys-tems which are zero-k...
This work is focused on the description of one verifiable encryption scheme, specifically a zero-kno...
In identification protocols with public verifier coins (like Fiat-Shamir), a passive adversary watch...
Identification protocols based on the Computational Diffie Hellman Problem (CDHP) generally assume t...
The material below covers two lectures on the beautiful and influential concept of zero-knowledge pr...
Abstract. Zero-knowledge proofs with witness elimination are proto-cols that enable a prover to demo...
In this paper we examine the role of Identification Protocols in the field of Cryptography. Firstly,...
In this paper we examine the role of Identification Protocols in the field of Cryptography. Firstly,...
In this paper we examine the role of Identification Protocols in the field of Cryptography. Firstly,...
In this paper we examine the role of Identification Protocols in the field of Cryptography. Firstly,...
This dissertation studies three cryptographic tools: identification schemes -- collections of algori...
This dissertation studies three cryptographic tools: identification schemes -- collections of algori...
We show that any problem that has a classical zero-knowledge protocol against the honest verifier al...
We show that any problem that has a classical zero-knowledge protocol against the honest verifier al...
International audienceWe provide a generic construction of non-interactive zero-knowledge (NIZK) sch...
This paper presents two transformations of public-coin/Arthur-Merlin proof sys-tems which are zero-k...
This work is focused on the description of one verifiable encryption scheme, specifically a zero-kno...
In identification protocols with public verifier coins (like Fiat-Shamir), a passive adversary watch...
Identification protocols based on the Computational Diffie Hellman Problem (CDHP) generally assume t...
The material below covers two lectures on the beautiful and influential concept of zero-knowledge pr...
Abstract. Zero-knowledge proofs with witness elimination are proto-cols that enable a prover to demo...
In this paper we examine the role of Identification Protocols in the field of Cryptography. Firstly,...
In this paper we examine the role of Identification Protocols in the field of Cryptography. Firstly,...
In this paper we examine the role of Identification Protocols in the field of Cryptography. Firstly,...
In this paper we examine the role of Identification Protocols in the field of Cryptography. Firstly,...
This dissertation studies three cryptographic tools: identification schemes -- collections of algori...
This dissertation studies three cryptographic tools: identification schemes -- collections of algori...
We show that any problem that has a classical zero-knowledge protocol against the honest verifier al...
We show that any problem that has a classical zero-knowledge protocol against the honest verifier al...
International audienceWe provide a generic construction of non-interactive zero-knowledge (NIZK) sch...
This paper presents two transformations of public-coin/Arthur-Merlin proof sys-tems which are zero-k...
This work is focused on the description of one verifiable encryption scheme, specifically a zero-kno...