Hashing Functions can Simplify Zero-Knowledge Protocol Design (too)

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Hashing Functions can Simplify Zero- Knowledge Protocol Design (too)

In Crypto93, Damg̊ard showed that any constant-round protocol in which the verifier sends only independent, random bits and which is zero-knowledge against the honest verifier can be transformed into a protocol (for the same problem) that is zero-knowledge in general. His transformation was based on the interactive hashing technique of Naor, Ostrovsky, Venkatesan and Yung, and thus the resulting...

متن کامل

Interactive Hashing Simplifies Zero-Knowledge Protocol Design

Often the core diiculty in designing zero-knowledge protocols arises from having to consider every possible cheating veriier trying to extract additional information. We here consider a compiler which transforms protocols proven secure only with respect to the honest veriier into protocols which are secure against any (even cheating) veriier. Such a compiler, which preserves the zero-knowledge ...

متن کامل

Interactive Hashing Simpli es Zero-Knowledge Protocol Design

Often the core di culty in designing zero-knowledge protocols arises from having to consider every possible cheating veri er trying to extract additional information. We here consider a compiler which transforms protocols proven secure only with respect to the honest veri er into protocols which are secure against any (even cheating) veri er. Such a compiler, which preserves the zero-knowledge ...

متن کامل

Zero Knowledge Password Authentication Protocol

In many applications, the password is sent as cleartext to the server to be authenticated thus providing the eavesdropper with opportunity to steal valuable data. This paper presents a simple protocol based on zero knowledge proof by which the user can prove to the authentication server that he has the password without having to send the password to the server as either cleartext or in encrypte...

متن کامل

Zero Shot Hashing

This paper provides a framework to hash images containing instances of unknown object classes. In many object recognition problems, we might have access to huge amount of data. It may so happen that even this huge data doesn’t cover the objects belonging to classes that we see in our day to day life. Zero shot learning exploits auxiliary information (also called as signatures) in order to predi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: BRICS Report Series

سال: 1994

ISSN: 1601-5355,0909-0878

DOI: 10.7146/brics.v1i39.21604