-
2
-
-
0021522644
-
How to Generate Cryptographically Strong Sequences Of Pseudo-Random Bits
-
FOCS 82
-
Blum M., and S. Micali “How to Generate Cryptographically Strong Sequences Of Pseudo-Random Bits” SIAM J. on Computing, Vol 13, 1984, pp. 850-864, FOCS 82.
-
(1984)
SIAM J. On Computing
, vol.13
, pp. 850-864
-
-
Blum, M.1
Micali, S.2
-
3
-
-
85028924811
-
Non-Interactive Zero-Knowledge Proof Systems and Applications
-
Blum M., P. Feldman, and S. Micali “Non-Interactive Zero-Knowledge Proof Systems and Applications” STOC 88.
-
STOC 88
-
-
Blum, M.1
Feldman, P.2
Micali, S.3
-
5
-
-
0003030602
-
Coin Flipping over the Telephone
-
Blum, M., “Coin Flipping over the Telephone,” IEEE COMPCON 1982, pp. 133-137.
-
(1982)
IEEE COMPCON
, pp. 133-137
-
-
Blum, M.1
-
6
-
-
0025056443
-
A Discrete Logarithm Implementation of Perfect Zero-Knowledge Blobs
-
Springer International
-
J. Boyar, S. Kurtz, and M. Krental A Discrete Logarithm Implementation of Perfect Zero-Knowledge Blobs, Journal of Cryptology, V. 2 N. 2, 1990, pp. 63-76, Springer International.
-
(1990)
Journal of Cryptology
, vol.2
, Issue.2
, pp. 63-76
-
-
Boyar, J.1
Kurtz, S.2
Krental, M.3
-
7
-
-
84951028589
-
On Defining Proof of Knowledge
-
(this proceedings)
-
Bellare M., and O. Goldreich, “On Defining Proof of Knowledge” CRYPTO 92 (this proceedings).
-
CRYPTO 92
-
-
Bellare, M.1
Goldreich, O.2
-
8
-
-
0022880639
-
Non-Transitive Transfer of Confidence: A Perfect Zero-Knowledge Interactive Protocol for SAT and Beyond
-
G. Brassard, C. Crépeau, “Non-Transitive Transfer of Confidence: A Perfect Zero-Knowledge Interactive Protocol for SAT and Beyond”, FOCS 86 pp. 188-195.
-
FOCS
, vol.86
, pp. 188-195
-
-
Brassard, G.1
Crépeau, C.2
-
9
-
-
0000867507
-
Minimum Disclosure Proofs of Knowledge
-
G. Brassard, D. Chaum and C. Crépeau, Minimum Disclosure Proofs of Knowledge, JCSS, v. 37, pp 156-189.
-
JCSS
, vol.37
, pp. 156-189
-
-
Brassard, G.1
Chaum, D.2
Crépeau, C.3
-
10
-
-
85028939586
-
Everything in NP can be proven in Perfect Zero Knowledge In a bounded number of rounds
-
(Also in TCS)
-
Brassard G., C. Crépeau, and M. Yung, “Everything in NP can be proven in Perfect Zero Knowledge In a bounded number of rounds,” ICALP 89. (Also in TCS).
-
ICALP 89
-
-
Brassard, G.1
Crépeau, C.2
Yung, M.3
-
12
-
-
33747837753
-
Demonstrating that a public predicate can be satisfied without revealing any information about how
-
Chaum, D., “Demonstrating that a public predicate can be satisfied without revealing any information about how”, Crypto 86.
-
Crypto 86
-
-
Chaum, D.1
-
13
-
-
0002859474
-
Multiparty Computations Ensuring Secrecy of each Party’s Input and Correctness of the Output
-
D. Chaum, I. Damgard and J. van de Graaf, Multiparty Computations Ensuring Secrecy of each Party’s Input and Correctness of the Output, Proc. of Crypto 87, pp. 462.
-
Proc. Of Crypto 87
, pp. 462
-
-
Chaum, D.1
Damgard, I.2
Van De Graaf, J.3
-
14
-
-
0023569922
-
Zero-Knowledge Proofs of Identity
-
U. Feige, A. Fiat and A. Shamir, Zero-Knowledge Proofs of Identity, STOC 87, pp. 210-217.
-
STOC 87
, pp. 210-217
-
-
Feige, U.1
Fiat, A.2
Shamir, A.3
-
15
-
-
85028750306
-
Security Preserving Amplification of Hardness
-
O. Goldreich, R. Impagliazzo, L. Levin, R. Venkatesan, and D. Zuckerman, Security Preserving Amplification of Hardness, FOCS 90.
-
FOCS 90
-
-
Goldreich, O.1
Impagliazzo, R.2
Levin, L.3
Venkatesan, R.4
Zuckerman, D.5
-
17
-
-
0022914590
-
Proofs that Yields Nothing But their Validity
-
(also in JACM)
-
S. Goldreich, S. Micali and A. Wigderson, Proofs that Yields Nothing But their Validity, FOCS 86, pp. 174-187. (also in JACM).
-
FOCS 86
, pp. 174-187
-
-
Goldreich, S.1
Micali, S.2
Wigderson, A.3
-
18
-
-
0021941417
-
The Knowledge Complexity of Interactive Proof-Systems
-
also in SIAM J. COMP.)
-
S. Goldwasser, S. Micali and C. Rackoff, The Knowledge Complexity of Interactive Proof-Systems, STOC 85, pp. 291-304. (also in SIAM J. COMP.)
-
STOC 85
, pp. 291-304
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
19
-
-
84969331532
-
Pseudo-Random Generators under Uniform Assumptions
-
Håstad, J., “Pseudo-Random Generators under Uniform Assumptions”, STOC 90.
-
STOC 90
-
-
Håstad, J.1
-
21
-
-
0024770898
-
One-way Functions are Essential for Complexity-Based Cryptography
-
R. Impagliazzo and M. Luby, One-way Functions are Essential for Complexity-Based Cryptography FOCS 89, pp. 230-235.
-
FOCS 89
, pp. 230-235
-
-
Impagliazzo, R.1
Luby, M.2
-
22
-
-
0024768555
-
Efficient Cryptographic Schemes Provably as Secure as Subset-Sum
-
R. Impagliazzo and M. Naor, Efficient Cryptographic Schemes Provably as Secure as Subset-Sum, Proc. of FOCS 89, pp. 236-241.
-
Proc. Of FOCS
, vol.89
, pp. 236-241
-
-
Impagliazzo, R.1
Naor, M.2
-
23
-
-
85028916459
-
On the Limitations of certain One-Way Permutations
-
R. Impagliazzo and S. Rudich, On the Limitations of certain One-Way Permutations, Proc. of STOC 89, pp. 44-61.
-
Proc. Of STOC 89
, pp. 44-61
-
-
Impagliazzo, R.1
Rudich, S.2
-
26
-
-
84949044492
-
Bit Commitment Using Pseudo-Randomness
-
M. Naor “Bit Commitment Using Pseudo-Randomness” Crypto-89 pp. 123-132.
-
Crypto-89
, pp. 123-132
-
-
Naor, M.1
-
27
-
-
84974533327
-
Universal One-Way Hash Functions and their Cryptographic Applications
-
M. Naor and M. Yung, Universal One-Way Hash Functions and their Cryptographic Applications, STOC 89.
-
STOC 89
-
-
Naor, M.1
Yung, M.2
-
31
-
-
84945140078
-
One-way Functions are Necessary and Sufficient for Secure Signatures
-
J. Rompel “One-way Functions are Necessary and Sufficient for Secure Signatures” STOC 90.
-
STOC 90
-
-
Rompel, J.1
-
32
-
-
85009027598
-
Random Self-Reducibility and Zero-Knoweldge Interactive-Proofs of Possession of Information
-
M. Tompa and H. Woll, Random Self-Reducibility and Zero-Knoweldge Interactive-Proofs of Possession of Information, Proc. of FOCS 1987.
-
(1987)
Proc. Of FOCS
-
-
Tompa, M.1
Woll, H.2
|