Perfect zero-knowledge arguments for NP using any one-way permutation

From MaRDI portal
Publication:1126890

DOI10.1007/s001459900037zbMath0960.94016OpenAlexW2049198367WikidataQ126298213 ScholiaQ126298213MaRDI QIDQ1126890

Ramarathnam Venkatesan, Moni Naor, Rafail Ostrovsky, Mordechai M. Yung

Publication date: 20 May 2001

Published in: Journal of Cryptology (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/s001459900037



Related Items

Concurrent knowledge extraction in public-key modelsQuantum bit-commitment for small storage based on quantum one-way permutationsComputational hardness of optimal fair computation: beyond MinicryptOn the ring-LWE and polynomial-LWE problemsOptimal forgeries against polynomial-based MACs and GCMLong-term security and universal composabilitySuper-Perfect Zero-Knowledge ProofsConstant-round zero-knowledge proofs of knowledge with strict polynomial-time extractors for NPVerifiable relation sharing and multi-verifier zero-knowledge in two rounds: trading NIZKs with honest majority (extended abstract)Round-optimal honest-majority MPC in Minicrypt and with everlasting security (extended abstract)Statistical security in two-party computation revisitedGeneral properties of quantum bit commitments (extended abstract)Quantum computationally predicate-binding commitments with application in quantum zero-knowledge arguments for NPMore efficient verifiable functional encryptionOn the impossibility of non-static quantum bit commitment between two partiesA new interactive hashing theoremOptimal Reductions Between Oblivious Transfers Using Interactive HashingSemi-honest to Malicious Oblivious Transfer—The Black-Box WayA Linear Lower Bound on the Communication Complexity of Single-Server Private Information RetrievalHow to achieve perfect simulation and a complete problem for non-interactive perfect zero-knowledgeThe Complexity of Zero KnowledgeEfficient Oblivious Transfer from Lossy Threshold Homomorphic EncryptionReducing complexity assumptions for statistically-hiding commitmentOn the Power of Secure Two-Party ComputationBit Commitment in the Bounded Storage Model: Tight Bound and Simple Optimal ConstructionInteractive Hashing: An Information Theoretic Tool (Invited Talk)Finding Collisions in Interactive Protocols---Tight Lower Bounds on the Round and Communication Complexities of Statistically Hiding CommitmentsBlack-box use of one-way functions is useless for optimal fair coin-tossing