scientific article; zbMATH DE number 4037759
From MaRDI portal
Publication:3777937
zbMATH Open0636.94010MaRDI QIDQ3777937FDOQ3777937
Authors: Oded Goldreich, Silvio Micali, A. Wigderson
Publication date: 1987
Title of this publication is not available (Why is that?)
Recommendations
- Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems
- scientific article; zbMATH DE number 94166
- On the communication complexity of zero-knowledge proofs
- Zero-Knowledge Simulation of Boolean Circuits
- The Knowledge Complexity of Interactive Proof Systems
complexityVLSI circuitsrouting algorithmzero-knowledge proofstrack numberriver routing.CNF formulalayout designChannel routingencryption functions
Cited In (62)
- Sigma protocols from verifiable secret sharing and their applications
- The power of undirected rewindings for adaptive security
- DORAM revisited: maliciously secure RAM-MPC with logarithmic overhead
- Two-round MPC without round collapsing revisited -- towards efficient malicious protocols
- Group encryption: full dynamicity, message filtering and code-based instantiation
- Breaking and fixing garbled circuits when a gate has duplicate input wires
- Two-round stateless deterministic two-party Schnorr signatures from pseudorandom correlation functions
- Commitments to quantum states
- The round complexity of statistical MPC with optimal resiliency
- Round-optimal honest-majority MPC in Minicrypt and with everlasting security (extended abstract)
- Constant-Round Nonmalleable Commitments from Any One-Way Function
- Improved secure multiparty computation with a dishonest majority via quantum means
- One-way functions imply secure computation in a quantum world
- Quantum multi-valued Byzantine agreement based on d-dimensional entangled states
- Quantum protocol for millionaire problem
- Concurrent knowledge extraction in public-key models
- Efficient set intersection with simulation-based security
- Zero-knowledge proofs for committed symmetric Boolean functions
- Round efficient secure multiparty quantum computation with identifiable abort
- Multiparty generation of an RSA modulus
- On the design of cryptographic primitives
- Game theoretic notions of fairness in multi-party coin toss
- Game-theoretic fairness meets multi-party protocols: the case of leader election
- Silver: silent VOLE and oblivious transfer from hardness of decoding structured LDPC codes
- Foundations of homomorphic secret sharing
- Group encryption: full dynamicity, message filtering and code-based instantiation
- A note on universal composable zero-knowledge in the common reference string model
- Oblivious transfer from any non-trivial elastic noisy channel via secret key agreement
- Mathematical problems in cryptology
- Improving the efficiency of AES protocols in multi-party computation
- How to share a secret with cheaters
- Universal Constructions and Robust Combiners for Indistinguishability Obfuscation and Witness Encryption
- Toward a Generic Construction of Universally Convertible Undeniable Signatures from Pairing-Based Signatures
- The complexity of differential privacy
- Title not available (Why is that?)
- Random sources in private computation
- Injective trapdoor functions via derandomization: how strong is Rudich's black-box barrier?
- Multi-theorem preprocessing NIZKs from lattices
- Non-interactive provably secure attestations for arbitrary RSA prime generation algorithms
- A complete characterization of game-theoretically fair, multi-party coin toss
- Breaking the circuit size barrier for secure computation under quasi-polynomial LPN
- Oblivious transfer is in MiniQCrypt
- Non-interactive composition of sigma-protocols via Share-then-Hash
- Physical zero-knowledge proof and NP-completeness proof of Suguru puzzle
- Efficient generic zero-knowledge proofs from commitments (extended abstract)
- A geometric approach to homomorphic secret sharing
- Round-optimal verifiable oblivious pseudorandom functions from ideal lattices
- Updateable Inner Product Argument with Logarithmic Verifier and Applications
- Broadcast from minicast secure against general adversaries
- Injective trapdoor functions via derandomization: how strong is Rudich's black-box barrier?
- Secure multi-party quantum summation based on quantum Fourier transform
- Efficient NIZKs from LWE via polynomial reconstruction and ``MPC in the head
- Quantum secure multi-party summation based on Grover's search algorithm
- A class of protocols for quantum private comparison based on the symmetry of states
- NIZK from SNARGs
- Quantum solution to a class of two-party private summation problems
- Some open problems in information-theoretic cryptography
- Low-leakage secure search for Boolean expressions
- Blind key-generation attribute-based encryption for general predicates
- Succinct interactive oracle proofs: applications and limitations
- Actively secure garbled circuits with constant communication overhead in the plain model
- Efficient zero-knowledge proof of algebraic and non-algebraic statements with applications to privacy preserving credentials
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3777937)