Minimal Assumptions and Round Complexity for Concurrent Zero-Knowledge in the Bare Public-Key Model

Author(s):  
Giovanni Di Crescenzo
Author(s):  
Itay Berman ◽  
Akshay Degwekar ◽  
Ron D. Rothblum ◽  
Prashant Nalini Vasudevan

1994 ◽  
Vol 1 (39) ◽  
Author(s):  
Ivan B. Damgård ◽  
Oded Goldreich ◽  
Avi Wigderson

In <em>Crypto93</em>, Damgård showed that any constant-round protocol in which the verifier sends only independent, random bits and which is zero-knowledge against the <em>honest</em> verifier can be transformed into a protocol (for the same problem) that is zero-knowledge <em>in general</em>. His transformation was based on the interactive hashing technique of Naor, Ostrovsky, Venkatesan and Yung, and thus the resulting protocol had very large round-complexity.


Author(s):  
S. Dov Gordon ◽  
Hoeteck Wee ◽  
David Xiao ◽  
Arkady Yerukhimovich

2012 ◽  
Vol 546-547 ◽  
pp. 526-530
Author(s):  
Qian Zhang ◽  
De Han

In this paper, through introducing the Williams public-key cryptosystem in detail, the analysis of the characteristics of the system, and the combination with zero knowledge proof, we set up a zero-knowledge proof scheme based on Williams public-key cryptosystem. The scheme will enrich the theory of cryptography, and particularly zero-knowledge proof theory.


Author(s):  
Rong HU ◽  
Kirill MOROZOV ◽  
Tsuyoshi TAKAGI

Author(s):  
NIVEDITA DATTA

In many applications, the password is sent as cleartext to the server to be authenticated thus providing the eavesdropper with opportunity to steal valuable data. This paper presents a simple protocol based on zero knowledge proof by which the user can prove to the authentication server that he has the password without having to send the password to the server as either cleartext or in encrypted format. Thus the user can authenticate himself without having to actually reveal the password to the server. Also, another version of this protocol has been proposed which makes use of public key cryptography thus adding one more level of security to the protocol and enabling mutual authentication between the client & server.


Sign in / Sign up

Export Citation Format

Share Document