In this paper, we investigate on threshold proofs, a framework for distributing the prover’s side of interactive proofs of knowledge over multiple parties. Interactive proofs of knowledge (PoK) are widely used primitives of cryptographic protocols, including important user-centric protocols, such as identification schemes, electronic cash (e-cash), and anonymous credentials. We present a security model for threshold proofs of knowledge and develop threshold versions of well-known primitives such as range proofs, zero-knowledge proofs for preimages of homomorphisms (which generalizes PoKs of discrete logarithms, representations, p-th roots, etc.), as well as OR statements. These building blocks are proven secure in our model. Furthermore, we...
Developers building cryptography into security-sensitive applications face a daunting task. Not only...
The material below covers two lectures on the beautiful and influential concept of zero-knowledge pr...
Abstract. Threshold cryptography is a fundamental distributed computational paradigm for enhancing t...
Crypto-computing is a set of well-known techniques for computing with encrypted data. The security o...
A zero-knowledge proof is a fundamental cryptographic primitive that enables the verification of sta...
Zero-knowledge proofs provide a means for a prover to convince a verifier that some claim is true an...
In recent years, many advances have been made in cryptography, as well as in the performance of comm...
Distributed protocols allow a cryptographic scheme to distribute its operation among a group of part...
A zero-knowledge proof (ZKP) is an interactive proof that allows a prover to prove the knowledge of ...
Recently, there has been great interest towards constructing efficient zero-knowledge proofs for pra...
AbstractWe present two protocols for threshold password authenticated key exchange. In this model fo...
The problem of digital identity acquires more relevance every day in the eyes of a society that spen...
Thesis (Ph.D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer ...
Threshold cryptography increases security and resilience by sharing a private cryptographic key over...
Recent efficient constructions of zero-knowledge Succinct Non-interactive Arguments of Knowledge (zk...
Developers building cryptography into security-sensitive applications face a daunting task. Not only...
The material below covers two lectures on the beautiful and influential concept of zero-knowledge pr...
Abstract. Threshold cryptography is a fundamental distributed computational paradigm for enhancing t...
Crypto-computing is a set of well-known techniques for computing with encrypted data. The security o...
A zero-knowledge proof is a fundamental cryptographic primitive that enables the verification of sta...
Zero-knowledge proofs provide a means for a prover to convince a verifier that some claim is true an...
In recent years, many advances have been made in cryptography, as well as in the performance of comm...
Distributed protocols allow a cryptographic scheme to distribute its operation among a group of part...
A zero-knowledge proof (ZKP) is an interactive proof that allows a prover to prove the knowledge of ...
Recently, there has been great interest towards constructing efficient zero-knowledge proofs for pra...
AbstractWe present two protocols for threshold password authenticated key exchange. In this model fo...
The problem of digital identity acquires more relevance every day in the eyes of a society that spen...
Thesis (Ph.D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer ...
Threshold cryptography increases security and resilience by sharing a private cryptographic key over...
Recent efficient constructions of zero-knowledge Succinct Non-interactive Arguments of Knowledge (zk...
Developers building cryptography into security-sensitive applications face a daunting task. Not only...
The material below covers two lectures on the beautiful and influential concept of zero-knowledge pr...
Abstract. Threshold cryptography is a fundamental distributed computational paradigm for enhancing t...