Sherlock Holmes zero-knowledge protocols
From MaRDI portal
Publication:6111601
DOI10.1007/978-3-031-21280-2_32zbMath1528.94082OpenAlexW4312686235MaRDI QIDQ6111601
Publication date: 4 August 2023
Published in: Information Security Practice and Experience (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-031-21280-2_32
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Practical hybrid (hierarchical) identity-based encryption schemes based on the decisional bilinear Diffie-Hellman assumption
- Zero-knowledge proofs of identity
- Efficient cryptosystems from \(2^k\)-th power residue symbols
- No-leak authentication by the Sherlock Holmes method
- An efficient identification protocol secure against concurrent-reset attacks
- Unifying Zero-Knowledge Proofs of Knowledge
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- The Knowledge Complexity of Interactive Proof Systems
- An Identity Based Encryption Scheme Based on Quadratic Residues
- An efficient and secure two-flow zero-knowledge identification protocol
This page was built for publication: Sherlock Holmes zero-knowledge protocols