A Note on Constant-Round Zero-Knowledge Proofs of Knowledge
暂无分享,去创建一个
[1] Adi Shamir,et al. Zero Knowledge Proofs of Knowledge in Two Rounds , 1989, CRYPTO.
[2] Jonathan Katz,et al. Which Languages Have 4-Round Zero-Knowledge Proofs? , 2008, Journal of Cryptology.
[3] Markus Jakobsson,et al. Round-Optimal Zero-Knowledge Arguments Based on any One-Way Function , 1997, EUROCRYPT.
[5] Hugo Krawczyk,et al. On the Composition of Zero-Knowledge Proof Systems , 1990, ICALP.
[6] Rafail Ostrovsky,et al. Round-Optimal Secure Two-Party Computation , 2004, CRYPTO.
[7] Ran Canetti,et al. Security and Composition of Multiparty Cryptographic Protocols , 2000, Journal of Cryptology.
[8] I. Damgård,et al. The protocols. , 1989, The New Zealand nursing journal. Kai tiaki.
[9] Oded Goldreich,et al. How to construct constant-round zero-knowledge proof systems for NP , 1996, Journal of Cryptology.
[10] Oded Goldreich. Foundations of Cryptography: Index , 2001 .
[11] Oded Goldreich,et al. Foundations of Cryptography: Volume 1, Basic Tools , 2001 .
[12] Yehuda Lindell,et al. Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation , 2001, Journal of Cryptology.
[13] Mihir Bellare,et al. On Defining Proofs of Knowledge , 1992, CRYPTO.
[14] Oded Goldreich,et al. Foundations of Cryptography: List of Figures , 2001 .
[15] Silvio Micali,et al. The knowledge complexity of interactive proof-systems , 1985, STOC '85.
[16] Oded Goldreich,et al. The Foundations of Cryptography - Volume 2: Basic Applications , 2001 .
[17] S. Rajsbaum. Foundations of Cryptography , 2014 .
[18] Alon Rosen,et al. A Note on Constant-Round Zero-Knowledge Proofs for NP , 2004, TCC.
[19] Silvio Micali,et al. Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems , 1991, JACM.
[20] Oded Goldreich,et al. Foundations of Cryptography: Basic Tools , 2000 .
[21] Manuel Blum,et al. How to Prove a Theorem So No One Else Can Claim It , 2010 .
[22] Moni Naor,et al. Bit commitment using pseudorandomness , 1989, Journal of Cryptology.
[23] Oded Goldreich,et al. Foundations of Cryptography: Volume 2, Basic Applications , 2004 .