Lecture 14 - Zero Knowledge

نویسنده

  • Boaz Barak
چکیده

Zero knowledge proofs were invented by Goldwasser, Micali and Rackoff in 82 (the paper, which we’ll call GMR, appeared in FOCS 85). Zero-knowledge proofs (and interactive proofs in general, also introduced in that paper) turned out to be one of the most beautiful and influential concepts in computer science, with applications ranging from practical signature schemes to proving that many NP-complete problems are hard even to approximate.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Lecture 24 : Zero Knowledge

Last lecture, we discussed cryptographic protocols. In particular, we gave a quantum protocol for secret key exchange that is secure in an information theoretical sense provided there is a secure public classical channel. We also discussed bit commitment and showed that no quantum protocol has information theoretic security. Today we will discuss zero knowledge systems and give an example of a ...

متن کامل

Cmsc 858k — Advanced Topics in Cryptography

In a previous lecture, we saw how to construct a three-round zero-knowledge (ZK) proof system for graph 3-colorability with soundness error 1 − 1/ |E| on a common input G = (V,E). The soundness error can be made negligible, while maintaining zero knowledge, by repeating the protocol |E| · ω(log k) times sequentially (where k is the security parameter); unfortunately, this increases the round co...

متن کامل

Lecture 19 : Zero Knowledge Proofs - Part 4 Instructor : Rafael Pass Scribe : Shentong Wang Review : Definition for Zero Knowledge

Review: Definition for Zero Knowledge As a review of the previous lecture, it was defined that (P ,V) is a Zero Knowledge proof for L with respect to RL if the following holds: 1. Soundness: ∀x ∈ L,∃y ∈ {0, 1}∗s.t.Pr[Outv[P (x, y) ↔ V (x)] = 1] = 1 2. Completeness: ∀P ∗,∀x 6∈ L, ∀y ∈ {0, 1}∗s.t.Pr[Outv[P ∗(x, y) ↔ V (x)] = 1] ≤ 2(n) 3. For all PPT V ∗, there exists an expected PPT S such that f...

متن کامل

مقایسه تأثیر دو روش آموزشی (سخنرانی - بسته آموزشی) بر آگاهی دختران در مورد بهداشت بلوغ

Background & Aim: Adolescents have important role in building the societies. Some deficits were observed in students;apos knowledge regarding puberty health. This study aimed to compare the effect of two educational methods (lecture-educational package) on girl students;apos knowledge about puberty health.Methods & Materials: In this interventional study, 200 students were randomly selected thr...

متن کامل

Cmsc 858k — Advanced Topics in Cryptography

In a previous class (Lecture 25), we showed how to construct an identification scheme which is secure against a passive adversary using an Honest-Verifier Zero-Knowledge Proof of Knowledge (HVZK-PoK). We also showed that it is possible to construct an Identification Scheme secure against an active adversary using a Witness Indistinguishable Proof of Knowledge (WI-PoK). In this lecture, we will ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005