Hashing Functions can Simplify Zero-Knowledge Protocol Design (too)
نویسندگان
چکیده
منابع مشابه
Hashing Functions can Simplify Zero- Knowledge Protocol Design (too)
In Crypto93, Damg̊ard showed that any constant-round protocol in which the verifier sends only independent, random bits and which is zero-knowledge against the honest verifier can be transformed into a protocol (for the same problem) that is zero-knowledge in general. His transformation was based on the interactive hashing technique of Naor, Ostrovsky, Venkatesan and Yung, and thus the resulting...
متن کاملInteractive Hashing Simplifies Zero-Knowledge Protocol Design
Often the core diiculty in designing zero-knowledge protocols arises from having to consider every possible cheating veriier trying to extract additional information. We here consider a compiler which transforms protocols proven secure only with respect to the honest veriier into protocols which are secure against any (even cheating) veriier. Such a compiler, which preserves the zero-knowledge ...
متن کاملInteractive Hashing Simpli es Zero-Knowledge Protocol Design
Often the core di culty in designing zero-knowledge protocols arises from having to consider every possible cheating veri er trying to extract additional information. We here consider a compiler which transforms protocols proven secure only with respect to the honest veri er into protocols which are secure against any (even cheating) veri er. Such a compiler, which preserves the zero-knowledge ...
متن کاملZero Knowledge Password Authentication Protocol
In many applications, the password is sent as cleartext to the server to be authenticated thus providing the eavesdropper with opportunity to steal valuable data. This paper presents a simple protocol based on zero knowledge proof by which the user can prove to the authentication server that he has the password without having to send the password to the server as either cleartext or in encrypte...
متن کاملZero Shot Hashing
This paper provides a framework to hash images containing instances of unknown object classes. In many object recognition problems, we might have access to huge amount of data. It may so happen that even this huge data doesn’t cover the objects belonging to classes that we see in our day to day life. Zero shot learning exploits auxiliary information (also called as signatures) in order to predi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: BRICS Report Series
سال: 1994
ISSN: 1601-5355,0909-0878
DOI: 10.7146/brics.v1i39.21604