Sciweavers

189 search results - page 17 / 38
» Leakage-Resilient Zero Knowledge
Sort
View
ASIACRYPT
2006
Springer
14 years 1 months ago
A Weakness in Some Oblivious Transfer and Zero-Knowledge Protocols
Ventzislav Nikov, Svetla Nikova, Bart Preneel
CTRSA
2004
Springer
114views Cryptology» more  CTRSA 2004»
14 years 1 months ago
Cryptanalysis of a Zero-Knowledge Identification Protocol of Eurocrypt '95
We present a cryptanalysis of a zero-knowledge identification protocol introduced by Naccache et al. at Eurocrypt '95. Our cryptanalysis enables a polynomial-time attacker to ...
Jean-Sébastien Coron, David Naccache
EUROCRYPT
2006
Springer
14 years 1 months ago
Perfect Non-interactive Zero Knowledge for NP
Non-interactive zero-knowledge (NIZK) proof systems are fundamental cryptographic primitives used in many constructions, including CCA2-secure cryptosystems, digital signatures, an...
Jens Groth, Rafail Ostrovsky, Amit Sahai
ASIACRYPT
2001
Springer
14 years 1 months ago
Efficient Zero-Knowledge Authentication Based on a Linear Algebra Problem MinRank
A Zero-knowledge protocol provides provably secure entity authentication based on a hard computational problem. Among many schemes proposed since 1984, the most practical rely on f...
Nicolas Courtois
COCO
1991
Springer
130views Algorithms» more  COCO 1991»
14 years 1 months ago
One-Way Functions, Hard on Average Problems, and Statistical Zero-Knowledge Proofs
Abstract Rafail Ostrovskyy MIT Laboratory for Computer Science 545 Technology Square, Cambridge, MA 02139 In this paper, we study connections among one-way functions, hard on the ...
Rafail Ostrovsky