From weak to strong zero-knowledge and applications
From MaRDI portal
Publication:5261624
DOI10.1007/978-3-662-46494-6_4zbMATH Open1354.94026OpenAlexW1522899817MaRDI QIDQ5261624FDOQ5261624
Edward Lui, Rafael Pass, Kai-Min Chung
Publication date: 6 July 2015
Published in: Theory of Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-46494-6_4
Recommendations
Cited In (15)
- Knowledge encryption and its applications to simulatable protocols with low round-complexity
- A black-box approach to post-quantum zero-knowledge in constant rounds
- What security can we achieve within 4 rounds?
- Magic Adversaries Versus Individual Reduction: Science Wins Either Way
- Theory of Cryptography
- Improved computational extractors and their applications
- Low error efficient computational extractors in the CRS model
- Non-interactive distributional indistinguishability (NIDI) and non-malleable commitments
- On publicly-accountable zero-knowledge and small shuffle arguments
- Weak Zero-Knowledge beyond the Black-Box Barrier
- Simulating Auxiliary Inputs, Revisited
- Individual simulations
- Black-box impossibilities of obtaining 2-round weak ZK and strong WI from polynomial hardness
- On expected polynomial runtime in cryptography
- A Weakness in Some Oblivious Transfer and Zero-Knowledge Protocols
This page was built for publication: From weak to strong zero-knowledge and applications
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5261624)