From weak to strong zero-knowledge and applications
From MaRDI portal
Publication:5261624
Recommendations
Cited in
(17)- Weak zero-knowledge beyond the black-box barrier
- On publicly-accountable zero-knowledge and small shuffle arguments
- Weak Zero-Knowledge beyond the Black-Box Barrier
- A black-box approach to post-quantum zero-knowledge in constant rounds
- Simulating auxiliary inputs, revisited
- A Weakness in Some Oblivious Transfer and Zero-Knowledge Protocols
- Low error efficient computational extractors in the CRS model
- Non-interactive distributional indistinguishability (NIDI) and non-malleable commitments
- Magic adversaries versus individual reduction: science wins either way
- Improved computational extractors and their applications
- Knowledge encryption and its applications to simulatable protocols with low round-complexity
- Theory of Cryptography
- What security can we achieve within 4 rounds?
- Individual simulations
- Black-box impossibilities of obtaining 2-round weak ZK and strong WI from polynomial hardness
- On expected polynomial runtime in cryptography
- Weak zero-knowledge via the Goldreich-Levin theorem
This page was built for publication: From weak to strong zero-knowledge and applications
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5261624)