scientific article

From MaRDI portal
Publication:3210166

zbMath0722.68045MaRDI QIDQ3210166

Adi Shamir, Uriel Feige

Publication date: 1990


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items

A black-box approach to post-quantum zero-knowledge in constant roundsConcurrent knowledge extraction in public-key modelsNew Constructions of Efficient Simulation-Sound Commitments Using Encryption and Their ApplicationsRound-optimal fully black-box zero-knowledge arguments from one-way permutationsConstant-round leakage-resilient zero-knowledge from collision resistanceProtocols for collusion-secure asymmetric fingerprintingOn Non-Black-Box Simulation and the Impossibility of Approximate Obfuscation3-Message Zero Knowledge Against Human IgnoranceSpatial Isolation Implies Zero Knowledge Even in a Quantum WorldRound-optimal zero-knowledge proofs of knowledge for NPProofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systemsA note on constant-round zero-knowledge proofs of knowledgeCommunication efficient Zero-knowledge Proofs of knowledgePrecise zero-knowledge arguments with poly-logarithmic efficiencyPractical proofs of knowledge without relying on theoretical proofs of membership on languagesOn separating proofs of knowledge from proofs of membership of languages and its application to secure identification schemesConstant-round zero-knowledge proofs of knowledge with strict polynomial-time extractors for NPExistence of 3-round zero-knowledge proof systems for NPWhich languages have 4-round zero-knowledge proofs?Constant-round adaptive zero-knowledge proofs for NPIndividual simulationsConcurrent composition of differential privacyAdaptive zero-knowledge proofs and adaptively secure oblivious transferPractic zero-knowledge proofs: Giving hints and using deficienciesA framework for non-interactive instance-dependent commitment schemes (NIC)A language-dependent cryptographic primitiveEfficient non-malleable commitment schemesImproved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and ApplicationsThe Knowledge Complexity of Interactive Proof SystemsOn the Exact Round Complexity of Self-composable Two-Party ComputationMagic Adversaries Versus Individual Reduction: Science Wins Either WayLower bounds for non-black-box zero knowledgeEfficient non-malleable commitment schemesEfficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert AdversariesOn the power of secure two-party computationStrong Proofs of KnowledgeWhich languages have 4-round fully black-box zero-knowledge arguments from one-way functions?Handling expected polynomial-time strategies in simulation-based security proofsPrecise Time and Space Simulatable Zero-KnowledgeHybrid commitments and their applications to zero-knowledge proof systemsOn the Power of Secure Two-Party ComputationTwo-Message, Oblivious Evaluation of Cryptographic FunctionalitiesComposition of Zero-Knowledge Proofs with Efficient ProversPrivate Coins versus Public Coins in Zero-Knowledge Proof SystemsAdaptively secure distributed public-key systems.New techniques for zero-knowledge: leveraging inefficient provers to reduce assumptions, interaction, and trustConstant-round perfect zero-knowledge computationally convincing protocols