-
1
-
-
0026172266
-
Statistical zero-knowledge languages can be recognized in two rounds
-
AIELLO, W., AND HÅSTAD, J. Statistical zero-knowledge languages can be recognized in two rounds. JCSS 42, 3 (1991), 327-345.
-
(1991)
JCSS 42
, Issue.327-345
, pp. 3
-
-
AIELLO, W.1
HÅSTAD, J.2
-
4
-
-
35048840744
-
Constant-round oblivious transfer in the bounded storage odel
-
DING, Y. Z., HARNIK, D., ROSEN, A., AND SHALTIEL, R. Constant-round oblivious transfer in the bounded storage odel. In Theory of Cryptography, First Theory of Cryptography Conference, TCC 2004 (2004), pp. 446-472.
-
(2004)
Theory of Cryptography, First Theory of Cryptography Conference
, vol.TCC 2004
, pp. 446-472
-
-
DING, Y.Z.1
HARNIK, D.2
ROSEN, A.3
SHALTIEL, R.4
-
6
-
-
0036038989
-
Concurrent zero-knowledge with timing, evisited
-
GOLDREICH, O. Concurrent zero-knowledge with timing, evisited. In STOC (2002), pp. 332-340.
-
(2002)
STOC
, pp. 332-340
-
-
GOLDREICH, O.1
-
7
-
-
0000108216
-
How to construct constant-round zero-knowledge proof systems for NP
-
GOLDREICH, O., AND KAHAN, A. How to construct constant-round zero-knowledge proof systems for NP. Journal of Cryptology 9, 3 (1996), 167-190.
-
(1996)
Journal of Cryptology
, vol.9
, Issue.3
, pp. 167-190
-
-
GOLDREICH, O.1
KAHAN, A.2
-
8
-
-
0029767165
-
-
GOLDREICH, O., AND KRAWCZYK, H. On the composition f zero-knowledge proof systems. SIAM J. Comput. 25, 1 (1996), 169-192. Preliminary version in ICALP'90.
-
GOLDREICH, O., AND KRAWCZYK, H. On the composition f zero-knowledge proof systems. SIAM J. Comput. 25, 1 (1996), 169-192. Preliminary version in ICALP'90.
-
-
-
-
9
-
-
71149116146
-
Journal of the ACM 38
-
1 1991, Preliminary version in FOCS'86
-
GOLDREICH, O., MICALI, S., AND WIGDERSON, A. Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems. Journal of the ACM 38, 1 (1991), 691-729. Preliminary version in FOCS'86.
-
-
-
GOLDREICH, O.1
MICALI, S.2
WIGDERSON, A.3
-
10
-
-
0032691797
-
Comparing entropies in statistical zero knowledge with applications to the structure of szk
-
GOLDREICH, O., AND VADHAN, S. P. Comparing entropies in statistical zero knowledge with applications to the structure of szk. In IEEE Conference on Computational Complexity (1999), pp. 54-.
-
(1999)
IEEE Conference on Computational Complexity
, pp. 54
-
-
GOLDREICH, O.1
VADHAN, S.P.2
-
11
-
-
0021409284
-
Probabilistic encryption
-
GOLDWASSER, S., AND MICALI, S. Probabilistic encryption. Journal of Computer and System Sciences 28, 2 (1984), 270-299.
-
(1984)
Journal of Computer and System Sciences
, vol.28
, Issue.2
, pp. 270-299
-
-
GOLDWASSER, S.1
MICALI, S.2
-
12
-
-
40249112675
-
Finding collisions in interactive protocols - A tight lower bound on the round complexity of statistically-hiding commitments
-
HAITNER, I., HOCH, J. J., REINGOLD, O., AND SEGEV, G. Finding collisions in interactive protocols - A tight lower bound on the round complexity of statistically-hiding commitments. In Proceedings of the 47th Annual Symposium on Foundations of Computer Science (FOCS) (2007).
-
(2007)
Proceedings of the 47th Annual Symposium on Foundations of Computer Science (FOCS)
-
-
HAITNER, I.1
HOCH, J.J.2
REINGOLD, O.3
SEGEV, G.4
-
13
-
-
24944462872
-
Reducing complexity assumptions for statistically-hiding commitment
-
HAITNER, I., HORVITZ, O., KATZ, J., KOO, C., MORSELLI, R., AND SHALTIEL, R. Reducing complexity assumptions for statistically-hiding commitment. In Advances in Cryptology - EUROCRYPT 2005(2005).
-
(2005)
Advances in Cryptology - EUROCRYPT 2005
-
-
HAITNER, I.1
HORVITZ, O.2
KATZ, J.3
KOO, C.4
MORSELLI, R.5
SHALTIEL, R.6
-
14
-
-
77955234904
-
SIAM Journal on Computing (2009). To appear. Preliminary versions in FOCS '06 and STOC '07
-
HAITNER, I., NGUYEN, M., ONG, S. J., REINGOLD, O., AND VADHAN, S. Statistically hiding commitments and statistical zero-knowledge arguments from any one-way function. SIAM Journal on Computing (2009). To appear. Preliminary versions in FOCS '06 and STOC '07.
-
-
-
HAITNER, I.1
NGUYEN, M.2
ONG, S.J.3
REINGOLD, O.4
VADHAN, S.5
-
16
-
-
0345253860
-
-
HÅSTAD, J., IMPAGLIAZZO, R., LEVIN, L. A., AND LUBY, M. A pseudorandom generator from any one-way function. SIAM Journal on Computing 28, 4 (1999), 1364-1396. Preliminary versions in STOC'89 and STOC'90.
-
HÅSTAD, J., IMPAGLIAZZO, R., LEVIN, L. A., AND LUBY, M. A pseudorandom generator from any one-way function. SIAM Journal on Computing 28, 4 (1999), 1364-1396. Preliminary versions in STOC'89 and STOC'90.
-
-
-
-
18
-
-
0001448484
-
-
NAOR, M. Bit commitment using pseudorandomness. Journal of Cryptology 4, 2 (1991), 151-158. Preliminary version in CRYPTO'89.
-
NAOR, M. Bit commitment using pseudorandomness. Journal of Cryptology 4, 2 (1991), 151-158. Preliminary version in CRYPTO'89.
-
-
-
-
19
-
-
0141544069
-
-
NAOR, M., OSTROVSKY, R., VENKATESAN, R., ANDYUNG, M. Perfect zero-knowledge arguments for NP using any one-way permutation. Journal of Cryptology 11, 2(1998), 87-108. Preliminary version in CRYPTO'92.
-
NAOR, M., OSTROVSKY, R., VENKATESAN, R., ANDYUNG, M. Perfect zero-knowledge arguments for NP using any one-way permutation. Journal of Cryptology 11, 2(1998), 87-108. Preliminary version in CRYPTO'92.
-
-
-
-
22
-
-
0030086632
-
Randomness is linear in space
-
NISAN, N., AND ZUCKERMAN, D. Randomness is linear in space. Journal of Computer and System Sciences 52, 1 1996), 43-52.
-
(1996)
Journal of Computer and System Sciences
, vol.52
, Issue.1
, pp. 43-52
-
-
NISAN, N.1
ZUCKERMAN, D.2
-
23
-
-
40249103094
-
An equivalence between zero knowledge and commitments
-
ONG, S. J., AND VADHAN, S. An equivalence between zero knowledge and commitments. In Theory of Cryptography, 5th Theory of Cryptography Conference, TCC 2008 (2008), p. 482-500.
-
(2008)
Theory of Cryptography, 5th Theory of Cryptography Conference, TCC 2008
, pp. 482-500
-
-
ONG, S.J.1
VADHAN, S.2
-
25
-
-
0030383547
-
On the knowledge complexity of np
-
PETRANK, E., AND TARDOS, G. On the knowledge complexity of np. In FOCS (1996), pp. 494-503.
-
(1996)
FOCS
, pp. 494-503
-
-
PETRANK, E.1
TARDOS, G.2
-
26
-
-
5044251619
-
Smooth Renyi entropy and applications
-
June, IEEE, p
-
RENNER, R., AND WOLF, S. Smooth Renyi entropy and applications. In IEEE International Symposium on Information Theory - ISIT 2004 (June 2004), IEEE, p. 233.
-
(2004)
IEEE International Symposium on Information Theory - ISIT 2004
, pp. 233
-
-
RENNER, R.1
WOLF, S.2
-
28
-
-
84890522850
-
Communication theory of secrecy systems
-
SHANNON, C. Communication theory of secrecy systems. Bell System Technical Journal 28, 4 (1949), 656-715.
-
(1949)
Bell System Technical Journal
, vol.28
, Issue.4
, pp. 656-715
-
-
SHANNON, C.1
-
29
-
-
0020301290
-
Theory and applications of trapdoor functions
-
YAO, A. C. Theory and applications of trapdoor functions. In FOCS (1982) pp. 80-91.
-
(1982)
FOCS
, pp. 80-91
-
-
YAO, A.C.1
|