Sciweavers

139 search results - page 16 / 28
» Zero-Knowledge
Sort
View
ICISS
2007
Springer
13 years 11 months ago
A Zero Knowledge Password Proof Mutual Authentication Technique Against Real-Time Phishing Attacks
Phishing attack is a kind of identity theft trying to steal confidential data. Existing approaches against phishing attacks cannot prevent real-time phishing attacks. This paper pr...
Mohsen Sharifi, Alireza Saberi, Mojtaba Vahidi, Mo...
ASIACRYPT
2006
Springer
13 years 11 months ago
A Weakness in Some Oblivious Transfer and Zero-Knowledge Protocols
Ventzislav Nikov, Svetla Nikova, Bart Preneel
CTRSA
2004
Springer
114views Cryptology» more  CTRSA 2004»
13 years 11 months ago
Cryptanalysis of a Zero-Knowledge Identification Protocol of Eurocrypt '95
We present a cryptanalysis of a zero-knowledge identification protocol introduced by Naccache et al. at Eurocrypt '95. Our cryptanalysis enables a polynomial-time attacker to ...
Jean-Sébastien Coron, David Naccache
EUROCRYPT
2006
Springer
13 years 11 months ago
Perfect Non-interactive Zero Knowledge for NP
Non-interactive zero-knowledge (NIZK) proof systems are fundamental cryptographic primitives used in many constructions, including CCA2-secure cryptosystems, digital signatures, an...
Jens Groth, Rafail Ostrovsky, Amit Sahai