On the Composition of Zero-Knowledge Proof Systems
From MaRDI portal
Publication:4875450
DOI10.1137/S0097539791220688zbMATH Open0841.68112MaRDI QIDQ4875450FDOQ4875450
Authors: Oded Goldreich, Hugo Krawczyk
Publication date: 2 July 1996
Published in: SIAM Journal on Computing (Search for Journal in Brave)
Recommendations
- scientific article; zbMATH DE number 177820
- Composition of zero-knowledge proofs with efficient provers
- scientific article; zbMATH DE number 1304087
- On the Composition of Public-Coin Zero-Knowledge Protocols
- On the composition of public-coin zero-knowledge protocols
- Efficient Constructions of Composable Commitments and Zero-Knowledge Proofs
- A framework for practical universally composable zero-knowledge protocols
- scientific article
- Zero-knowledge proofs from secure multiparty computation
- On sequential composition of precise zero-knowledge
Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Complexity classes (hierarchies, relations among complexity classes, etc.) (68Q15)
Cited In (88)
- The Round-Complexity of Black-Box Zero-Knowledge: A Combinatorial Characterization
- Optimal security for keyed hash functions: avoiding time-space tradeoffs for finding collisions
- Random oracles and non-uniformity
- On Monotone Formula Composition of Perfect Zero-Knowledge Languages
- Post-quantum insecurity from LWE
- The Knowledge Complexity of Interactive Proof Systems
- GNUC: a new universal composability framework
- Reduction zero-knowledge
- Concurrent knowledge extraction in public-key models
- A one-round, two-prover, zero-knowledge protocol for NP
- Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening
- A note on constant-round zero-knowledge proofs of knowledge
- \textsf{Halo Infinite}: proof-carrying data from additive polynomial commitments
- Parallel repetition of computationally sound protocols revisited
- An Equivalence Between Zero Knowledge and Commitments
- What security can we achieve within 4 rounds?
- Parallel and concurrent security of the HB and \(HB^{+}\) protocols
- Round-optimal fully black-box zero-knowledge arguments from one-way permutations
- Round optimal black-box ``commit-and-prove
- Cryptography and cryptographic protocols
- Round-optimal black-box commit-and-prove with succinct communication
- On the round complexity of black-box secure MPC
- The knowledge tightness of parallel zero-knowledge
- Possibility and impossibility results for selective decommitments
- What Security Can We Achieve Within 4 Rounds?
- Long-term security and universal composability
- Hybrid commitments and their applications to zero-knowledge proof systems
- Private coins versus public coins in zero-knowledge proof systems
- On the Composition of Public-Coin Zero-Knowledge Protocols
- On sequential composition of precise zero-knowledge
- Title not available (Why is that?)
- A uniform-complexity treatment of encryption and zero-knowledge
- Constant-round zero-knowledge proofs of knowledge with strict polynomial-time extractors for NP
- Unprovable security of perfect NIZK and non-interactive non-malleable commitments
- 3-message zero knowledge against human ignorance
- Impossibility of black-box simulation against leakage attacks
- Round-optimal multi-party computation with identifiable abort
- On the composition of public-coin zero-knowledge protocols
- Finding collisions in interactive protocols -- tight lower bounds on the round and communication complexities of statistically hiding commitments
- Statistical Zaps and new oblivious transfer protocols
- Which languages have 4-round fully black-box zero-knowledge arguments from one-way functions?
- Using fully homomorphic hybrid encryption to minimize non-interative zero-knowledge proofs
- Lower bounds for non-black-box zero knowledge
- Existence of 3-round zero-knowledge proof systems for NP
- Non-interactive zero-knowledge proofs for composite statements
- Magic functions
- Weak Zero-Knowledge beyond the Black-Box Barrier
- Public-coin parallel zero-knowledge for NP
- On non-black-box simulation and the impossibility of approximate obfuscation
- Round-optimal zero-knowledge proofs of knowledge for NP
- An almost-constant round interactive zero-knowledge proof
- Injective trapdoor functions via derandomization: how strong is Rudich's black-box barrier?
- Title not available (Why is that?)
- The hunting of the SNARK
- How to simulate it -- a tutorial on the simulation proof technique
- Individual simulations
- Post-quantum resettably-sound zero knowledge
- On the existence of extractable one-way functions
- Title not available (Why is that?)
- Composition of zero-knowledge proofs with efficient provers
- Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems
- Mathematical Foundations of Computer Science 2004
- Which languages have 4-round zero-knowledge proofs?
- Two-message, oblivious evaluation of cryptographic functionalities
- Non-black-box simulation in the fully concurrent setting, revisited
- Efficient Constructions of Composable Commitments and Zero-Knowledge Proofs
- On the enumeration of minimal non-pairwise compatibility graphs
- Parallel and Concurrent Security of the HB and HB + Protocols
- On the implausibility of constant-round public-coin zero-knowledge proofs
- An efficient statistical zero-knowledge authentication protocol for smart cards
- Knowledge encryption and its applications to simulatable protocols with low round-complexity
- Title not available (Why is that?)
- Broadcast-optimal four-round MPC in the plain model
- On zero-knowledge with strict polynomial-time simulation and extraction from differing-input obfuscation for circuits
- The Complexity of Zero Knowledge
- Universality of graph homomorphism games and the quantum coloring problem
- Round-optimal black-box MPC in the plain model
- Title not available (Why is that?)
- Injective trapdoor functions via derandomization: how strong is Rudich's black-box barrier?
- Strong batching for non-interactive statistical zero-knowledge
- CDS composition of multi-round protocols
- Threshold secret sharing with geometric algebras
- The round complexity of statistical MPC with optimal resiliency
- Is it possible to improve Yao's XOR lemma using reductions that exploit the efficiency of their oracle?
- Round-optimal honest-majority MPC in Minicrypt and with everlasting security (extended abstract)
- Concurrent composition of differential privacy
- Constructing tree decompositions of graphs with bounded gonality
- Public-coin 3-round zero-knowledge from learning with errors and keyless multi-collision-resistant hash
This page was built for publication: On the Composition of Zero-Knowledge Proof Systems
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4875450)