-
1
-
-
0035166072
-
How to go beyond the black-box simulation barrier
-
B. Barak. How to go Beyond the Black-Box Simulation Barrier. In 42nd FOCS, pages 106-115, 2001.
-
(2001)
42nd FOCS
, pp. 106-115
-
-
Barak, B.1
-
2
-
-
0036294828
-
Universal arguments and their applications
-
B. Barak and O. Goldreich. Universal Arguments and their Applications. 17th CCC, pages 194-203, 2002.
-
(2002)
17th CCC
, pp. 194-203
-
-
Barak, B.1
Goldreich, O.2
-
3
-
-
0036041101
-
Strict polynomial-time in simulation and extraction
-
B. Barak and Y. Lindell. Strict Polynomial-Time in Simulation and Extraction. In 34th STOC, pages 484-493, 2002.
-
(2002)
34th STOC
, pp. 484-493
-
-
Barak, B.1
Lindell, Y.2
-
4
-
-
0003384765
-
How to prove a theorem so no one else can claim it
-
Berkeley, California, USA
-
M. Blum. How to prove a Theorem So No One Else Can Claim It. Proc. of the International Congress of Mathematicians, Berkeley, California, USA, pages 1444-1451, 1986.
-
(1986)
Proc. of the International Congress of Mathematicians
, pp. 1444-1451
-
-
Blum, M.1
-
5
-
-
0003153237
-
Non-interactive zero-knowledge and its applications
-
M. Blum, P. Feldman and S. Micali. Non-Interactive Zero-Knowledge and Its Applications. In 20th STOC, pages 103-112, 1988
-
(1988)
20th STOC
, pp. 103-112
-
-
Blum, M.1
Feldman, P.2
Micali, S.3
-
6
-
-
0026383119
-
Noninteractive zero-knowledge
-
M. Blum, A. De Santis, S. Micali, and G. Persiano. Noninteractive zero-knowledge. SIAM J. Computing, 20(6):1084-1118, 1991.
-
(1991)
SIAM J. Computing
, vol.20
, Issue.6
, pp. 1084-1118
-
-
Blum, M.1
De Santis, A.2
Micali, S.3
Persiano, G.4
-
7
-
-
0038721038
-
Universally composable security: A new paradigm for cryptographic protocols
-
R. Canetti. Universally Composable Security: A New Paradigm for Cryptographic Protocols. In 34th STOC, pages 494-503, 2002.
-
(2002)
34th STOC
, pp. 494-503
-
-
Canetti, R.1
-
8
-
-
0010252194
-
Undeniable signatures
-
Springer LNCS 435
-
D. Chaum and H. van Antwerpen. Undeniable Signatures. In Crypto89, Springer LNCS 435, pages. 212-216, 1989.
-
(1989)
Crypto89
, pp. 212-216
-
-
Chaum, D.1
Van Antwerpen, H.2
-
9
-
-
85016672373
-
Proofs of partial knowledge and simplified design of witness hiding protocols
-
Springer LNCS 839
-
R. Cramer, I. Damgård and B. Schoenmakers. Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols. In Crypto94, Springer LNCS 839, pages. 174-187, 1994.
-
(1994)
Crypto94
, pp. 174-187
-
-
Cramer, R.1
Damgård, I.2
Schoenmakers, B.3
-
10
-
-
84974597111
-
Parallel reducibility for information-theoretically secure computation
-
Springer LNCS 1880 74-92
-
Y. Dodis and S. Micali, Parallel Reducibility for Information- Theoretically Secure Computation, In Crypto00, Springer LNCS 1880 74-92, 2000.
-
(2000)
Crypto00
-
-
Dodis, Y.1
Micali, S.2
-
11
-
-
0031632567
-
Concurrent zero-knowledge
-
C. Dwork, M. Naor and A. Sahai. Concurrent Zero-Knowledge. In 30th STOC, pages 409-418, 1998.
-
(1998)
30th STOC
, pp. 409-418
-
-
Dwork, C.1
Naor, M.2
Sahai, A.3
-
12
-
-
0004809522
-
A secure protocol for the oblivious transfer
-
M. Fischer, S. Micali, and C. Rackoff. A Secure Protocol for the Oblivious Transfer. Journal of Cryptology, 9(3): 191-195, 1996.
-
(1996)
Journal of Cryptology
, vol.9
, Issue.3
, pp. 191-195
-
-
Fischer, M.1
Micali, S.2
Rackoff, C.3
-
13
-
-
0024984004
-
Witness indistinguishability and witness hiding protocols
-
U. Feige and A. Shamir. Witness Indistinguishability and Witness Hiding Protocols. In 22nd STOC, pages 416-426, 1990.
-
(1990)
22nd STOC
, pp. 416-426
-
-
Feige, U.1
Shamir, A.2
-
14
-
-
84976826800
-
Zero knowledge proofs of knowledge in two rounds
-
Springer LNCS 435
-
U. Feige and A. Shamir. Zero Knowledge Proofs of Knowledge in Two Rounds. In Crypto89, Springer LNCS 435, pages. 526-544, 1989.
-
(1989)
Crypto89
, pp. 526-544
-
-
Feige, U.1
Shamir, A.2
-
15
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
Springer LNCS 263
-
A. Fiat and A. Shamir. How to Prove Yourself: Practical Solutions to Identification and Signature Problems. In Crypto86, Springer LNCS 263, pages 181-187, 1987
-
(1987)
Crypto86
, pp. 181-187
-
-
Fiat, A.1
Shamir, A.2
-
17
-
-
0000108216
-
How to construct constant-round zero-knowledge proof systems for NP
-
O. Goldreich and A. Kahan. How to Construct Constant-Round Zero-Knowledge Proof Systems for NP. Jour. of Cryptology, Vol. 9, No. 2, pages 167-189, 1996.
-
(1996)
Jour. of Cryptology
, vol.9
, Issue.2
, pp. 167-189
-
-
Goldreich, O.1
Kahan, A.2
-
18
-
-
71149116146
-
Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems
-
O. Goldreich, S. Micali and A. Wigderson. Proofs that Yield Nothing But Their Validity or All Languages in NP Have Zero-Knowledge Proof Systems. JACM, Vol. 38(1), pp. 691-729, 1991.
-
(1991)
JACM
, vol.38
, Issue.1
, pp. 691-729
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
19
-
-
0021941417
-
The knowledge complexity of interactive proof-systems
-
S. Goldwasser, S. Micali, and C. Rackoff. The knowledge complexity of interactive proof-systems. In STOC 85, pages 291-304, 1985.
-
(1985)
STOC 85
, pp. 291-304
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
20
-
-
0024611659
-
The knowledge complexity of interactive proof systems
-
S. Goldwasser, S. Micali and C. Rackoff. The Knowledge Complexity of Interactive Proof Systems. SIAM Jour. on Computing, Vol. 18(1), pp. 186-208, 1989.
-
(1989)
SIAM Jour. on Computing
, vol.18
, Issue.1
, pp. 186-208
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
21
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen message attacks
-
S. Goldwasser, S. Micali and R.L. Rivest. A Digital Signature Scheme Secure Against Adaptive Chosen Message Attacks. SIAM Jour. on Computing, Vol. 17, No. 2, pp. 281-308, 1988.
-
(1988)
SIAM Jour. on Computing
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.L.3
-
23
-
-
0345253860
-
Construction of pseudorandom generator from any one-way function
-
J. Hastad, R. Impagliazzo, L.A. Levin and M. Luby. Construction of Pseudorandom Generator from any One-Way Function. SIAM Jour. on Computing, Vol. 28 (4), pages 1364-1396, 1999.
-
(1999)
SIAM Jour. on Computing
, vol.28
, Issue.4
, pp. 1364-1396
-
-
Hastad, J.1
Impagliazzo, R.2
Levin, L.A.3
Luby, M.4
-
24
-
-
0026963441
-
A note on efficient zero-knowledge proofs and arguments
-
J. Kilian. A Note on Efficient Zero-Knowledge Proofs and Arguments. In 24th STOC, pages 723-732, 1992.
-
(1992)
24th STOC
, pp. 723-732
-
-
Kilian, J.1
-
25
-
-
35048833033
-
Parallel coin-tossing and constant-round secure two-party computation
-
Springer LNCS 2139
-
Y. Lindell. Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation. In Crypto01, Springer LNCS 2139, pages 171-189, 2001.
-
(2001)
Crypto01
, pp. 171-189
-
-
Lindell, Y.1
-
26
-
-
0034854953
-
CS proofs
-
S. Micali. CS Proofs. SIAM Jour. on Computing, Vol. 30 (4), pages 1253-1298, 2000.
-
(2000)
SIAM Jour. on Computing
, vol.30
, Issue.4
, pp. 1253-1298
-
-
Micali, S.1
-
27
-
-
35248837045
-
Statistical zero-knowledge proofs with efficient provers: Lattice problems and more
-
Springer LNCS 2729
-
D. Micciancio, S. Vadhan. Statistical zero-knowledge proofs with efficient provers: lattice problems and more. In Crypto03. Springer LNCS 2729, pages. 282-298, 2003.
-
(2003)
Crypto03
, pp. 282-298
-
-
Micciancio, D.1
Vadhan, S.2
-
28
-
-
84974655726
-
Secure computation
-
Unpublished manuscript, 1992, Preliminary version Springer (LNCS 576)
-
S. Micali and P. Rogaway. Secure computation. Unpublished manuscript, 1992. Preliminary version in Crypto91, Springer (LNCS 576), pages 392-404, 1991.
-
(1991)
Crypto91
, pp. 392-404
-
-
Micali, S.1
Rogaway, P.2
-
29
-
-
0001448484
-
Bit commitment using pseudorandomness
-
M. Naor. Bit Commitment using Pseudorandomness. Jour. of Cryptology, Vol. 4, pages 151-158, 1991.
-
(1991)
Jour. of Cryptology
, vol.4
, pp. 151-158
-
-
Naor, M.1
-
30
-
-
35248833045
-
Simulation in quasi-polynomial time and its application to protocol composition
-
Springer LNCS 2656
-
R. Pass. Simulation in Quasi-polynomial Time and its Application to Protocol Composition. In EuroCrypt03, Springer LNCS 2656, pages 160-176, 2003.
-
(2003)
EuroCrypt03
, pp. 160-176
-
-
Pass, R.1
-
31
-
-
34848838622
-
New and improved constructions of non-malleable cryptographic protocols
-
2004
-
R. Pass and A. Rosen. New and Improved Constructions of Non-Malleable Cryptographic Protocols. In 37th STOC, 2004, pages 533-542, 2005.
-
(2005)
37th STOC
, pp. 533-542
-
-
Pass, R.1
Rosen, A.2
-
32
-
-
0036957024
-
Concurrent zero-knowledge with logarithmic round complexity
-
M. Prabhakaran, A. Rosen and A. Sahai. Concurrent Zero-Knowledge with Logarithmic Round Complexity. In 43rd FOCS, pages 366-375, 2002.
-
(2002)
43rd FOCS
, pp. 366-375
-
-
Prabhakaran, M.1
Rosen, A.2
Sahai, A.3
-
33
-
-
84957621865
-
On the concurrent composition of zero-knowledge proofs
-
Springer LNCS 1592
-
R. Richardson and J. Kilian. On the Concurrent Composition of Zero-Knowledge Proofs. In EuroCrypt99, Springer LNCS 1592, pages 415-431, 1999.
-
(1999)
EuroCrypt99
, pp. 415-431
-
-
Richardson, R.1
Kilian, J.2
-
34
-
-
0344794410
-
A complete problem for statistical zero knowledge
-
A. Sahai and S. Vadhan. A complete problem for statistical zero knowledge. J. ACM, 50(2):196-249, 2003.
-
(2003)
J. ACM
, vol.50
, Issue.2
, pp. 196-249
-
-
Sahai, A.1
Vadhan, S.2
-
35
-
-
0023568495
-
Random self-reducibility and zero knowledge interactive proofs of possession of information
-
M. Tompa, H. Woll. Random Self-Reducibility and Zero Knowledge Interactive Proofs of Possession of Information. In 28th FOCS, pages 472-482, 1987.
-
(1987)
28th FOCS
, pp. 472-482
-
-
Tompa, M.1
Woll, H.2
|