Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1109/SFCS.1992.267809guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Zero-knowledge proofs of knowledge without interaction

Published: 24 October 1992 Publication History

Abstract

A zero-knowledge proof system of knowledge is a protocol between two parties called the prover and the verifier. The prover wants to convince the verifier that he 'knows' the proof of a given theorem without revealing any additional information. This is different from a zero-knowledge proof system of membership where the prover convinces the verifier only of the veridicity of the statement. Zero-knowledge proofs of knowledge are very useful tools in the design of secure protocols. Though, the concept of a proof of knowledge is a very subtle one and great care is needed to obtain a satisfying formalization. The authors investigate the concept of a zero-knowledge proof of knowledge with a non-interactive model. Here, the prover and the verifier share a short random string and the only communication allowed is from the prover to the verifier. Although this is a simpler model than the interactive one, still formalizing zero-knowledge proofs of knowledge is a delicate task.

Cited By

View all
  • (2024)An intrinsic integrity-driven rating model for a sustainable reputation systemExpert Systems with Applications: An International Journal10.1016/j.eswa.2024.123804249:PCOnline publication date: 17-Jul-2024
  • (2024)Amplification of Non-interactive Zero Knowledge, RevisitedAdvances in Cryptology – CRYPTO 202410.1007/978-3-031-68400-5_11(361-390)Online publication date: 18-Aug-2024
  • (2018)Improved Non-Interactive Zero Knowledge with Applications to Post-Quantum SignaturesProceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security10.1145/3243734.3243805(525-537)Online publication date: 15-Oct-2018
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
SFCS '92: Proceedings of the 33rd Annual Symposium on Foundations of Computer Science
October 1992
731 pages
ISBN:0818629002

Publisher

IEEE Computer Society

United States

Publication History

Published: 24 October 1992

Author Tags

  1. secure protocols
  2. zero-knowledge proof system

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 20 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)An intrinsic integrity-driven rating model for a sustainable reputation systemExpert Systems with Applications: An International Journal10.1016/j.eswa.2024.123804249:PCOnline publication date: 17-Jul-2024
  • (2024)Amplification of Non-interactive Zero Knowledge, RevisitedAdvances in Cryptology – CRYPTO 202410.1007/978-3-031-68400-5_11(361-390)Online publication date: 18-Aug-2024
  • (2018)Improved Non-Interactive Zero Knowledge with Applications to Post-Quantum SignaturesProceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security10.1145/3243734.3243805(525-537)Online publication date: 15-Oct-2018
  • (2017)Zero-Knowledge Contingent Payments RevisitedProceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security10.1145/3133956.3134060(229-243)Online publication date: 30-Oct-2017
  • (2017)Equivocating YaoProceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing10.1145/3055399.3055495(497-509)Online publication date: 19-Jun-2017
  • (2016)Separating Computational and Statistical Differential Privacy in the Client-Server ModelProceedings, Part I, of the 14th International Conference on Theory of Cryptography - Volume 998510.1007/978-3-662-53641-4_23(607-634)Online publication date: 31-Oct-2016
  • (2015)Vote Validatability in Mix-Net-Based eVotingProceedings of the 5th International Conference on E-Voting and Identity - Volume 926910.1007/978-3-319-22270-7_6(92-109)Online publication date: 2-Sep-2015
  • (2013)Resource-based corruptions and the combinatorics of hidden diversityProceedings of the 4th conference on Innovations in Theoretical Computer Science10.1145/2422436.2422482(415-428)Online publication date: 9-Jan-2013
  • (2013)Non Observability in the Random Oracle ModelProceedings of the 7th International Conference on Provable Security - Volume 820910.1007/978-3-642-41227-1_5(86-103)Online publication date: 23-Oct-2013
  • (2013)Concurrent zero knowledge in the bounded player modelProceedings of the 10th theory of cryptography conference on Theory of Cryptography10.1007/978-3-642-36594-2_4(60-79)Online publication date: 3-Mar-2013
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media