메뉴 건너뛰기




Volumn 1853, Issue , 2000, Pages 451-462

Necessary and sufficient assumptions for non-interactive zero-knowledge proofs of knowledge for all NP relations

Author keywords

[No Author keywords available]

Indexed keywords

HARDNESS; PUBLIC KEY CRYPTOGRAPHY;

EID: 84974625311     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-45022-x_38     Document Type: Conference Paper
Times cited : (24)

References (28)
  • 1
    • 84974618488 scopus 로고
    • How to Generated Random Factored numbers
    • E. Bach, How to Generated Random Factored numbers, SIAM Journal on Computing, vol. 17, n. 2, 1988.
    • (1988) SIAM Journal on Computing , vol.2 , pp. 17
    • Bach, E.1
  • 3
    • 84948138574 scopus 로고    scopus 로고
    • Adaptive Zero-Knowledge and Computational Equivocation
    • D. Beaver, Adaptive Zero-Knowledge and Computational Equivocation, in Proc. Of FOCS 96.
    • Proc. Of FOCS 96
    • Beaver, D.1
  • 4
    • 84974538446 scopus 로고    scopus 로고
    • Methodology for Constructing Signature Schemes based on Non-Interactive Zero-Knowledge Proofs
    • M. Bellare and S. Goldwasser, Methodology for Constructing Signature Schemes based on Non-Interactive Zero-Knowledge Proofs, in Proc. Of CRYPTO 88.
    • Proc. Of CRYPTO 88
    • Bellare, M.1    Goldwasser, S.2
  • 7
    • 0021522644 scopus 로고
    • How to Generate Cryptographically Strong Sequence of Pseudo-Random Bits
    • M. Blum and S. Micali, How to Generate Cryptographically Strong Sequence of Pseudo-Random Bits, SIAM J. on Computing, vol. 13, no. 4, 1984, pp. 850-864.
    • (1984) SIAM J. On Computing , vol.13 , Issue.4 , pp. 850-864
    • Blum, M.1    Micali, S.2
  • 10
    • 0012582886 scopus 로고    scopus 로고
    • Zero-Knowledge Proofs of Knowledge without Interaction
    • A. De Santis and P. Persiano, Zero-Knowledge Proofs of Knowledge without Interaction, in Proc. Of FOCS 92.
    • Proc. Of FOCS 92
    • De Santis, A.1    Persiano, P.2
  • 13
    • 84949022620 scopus 로고    scopus 로고
    • Multiple Non-Interactive Zero-Knowledge Proofs Based on a Single Random String
    • U. Feige, D. Lapidot, and A. Shamir, Multiple Non-Interactive Zero-Knowledge Proofs Based on a Single Random String, in Proc. Of STOC 90.
    • Proc. Of STOC 90
    • Feige, U.1    Lapidot, D.2    Shamir, A.3
  • 14
  • 15
    • 84974539086 scopus 로고    scopus 로고
    • A Hard-Core Predicate for any One-Way Function
    • O. Goldreich and L. Levin, A Hard-Core Predicate for any One-Way Function, in Proc. Of FOCS 90.
    • Proc. Of FOCS 90
    • Goldreich, O.1    Levin, L.2
  • 16
    • 71149116146 scopus 로고
    • Proofs that Yield Nothing but their Validity or All Languages in NP Have Zero-Knowledge Proof Systems
    • O. Goldreich, S. Micali, and A. Wigderson, Proofs that Yield Nothing but their Validity or All Languages in NP Have Zero-Knowledge Proof Systems, Journal of the ACM, vol. 38, n. 1, 1991, pp. 691-729.
    • (1991) Journal of the ACM , vol.38 , Issue.1 , pp. 691-729
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 19
    • 0345253860 scopus 로고    scopus 로고
    • Construction of a Pseudo- Random Generator from any One-Way Function
    • J. Hastad, R. Impagliazzo, L. Levin, and M. Luby, Construction of a Pseudo- Random Generator from any One-Way Function, SIAM Journal on Computing, vol. 28, n. 4, pp. 1364-1396, 1999.
    • (1999) SIAM Journal on Computing , vol.28 , Issue.4 , pp. 1364-1396
    • Hastad, J.1    Impagliazzo, R.2    Levin, L.3    Luby, M.4
  • 20
    • 85029660870 scopus 로고    scopus 로고
    • One-Way Functions are Necessary for Complexity- Based Cryptography
    • R. Impagliazzo and M. Luby, One-Way Functions are Necessary for Complexity- Based Cryptography, in Proc. Of FOCS 89.
    • Proc. Of FOCS 89
    • Impagliazzo, R.1    Luby, M.2
  • 21
    • 33745556642 scopus 로고    scopus 로고
    • Limits on the Provable Consequences of One-Way Permutations
    • R. Impagliazzo and S. Rudich, Limits on the Provable Consequences of One-Way Permutations, in Proc. Of STOC 91.
    • Proc. Of STOC 91
    • Impagliazzo, R.1    Rudich, S.2
  • 22
    • 0023984964 scopus 로고
    • How to Construct a Pseudo-Random Permutation from a Pseudo-Random Function
    • M. Luby and C. Rackoff, How to Construct a Pseudo-Random Permutation from a Pseudo-Random Function, in SIAM Journal on Computing, vol. 17, n.2, Aug 1988.
    • (1988) SIAM Journal on Computing , vol.17 , Issue.2
    • Luby, M.1    Rackoff, C.2
  • 23
    • 84949044492 scopus 로고    scopus 로고
    • Bit Commitment using Pseudorandomness
    • M. Naor, Bit Commitment using Pseudorandomness, in Proc. Of CRYPTO 91.
    • Proc. Of CRYPTO 91
    • Naor, M.1
  • 24
    • 84974533327 scopus 로고    scopus 로고
    • Universal One-way Hash Functions and their Cryptographic Applications
    • M. Naor and M. Yung, Universal One-way Hash Functions and their Cryptographic Applications, in Proc. Of STOC 89.
    • Proc. Of STOC 89
    • Naor, M.1    Yung, M.2
  • 25
    • 84974624785 scopus 로고    scopus 로고
    • Public-Key Cryptosystems Provably Secure against Chosen Ciphertext Attack
    • M. Naor and M. Yung, Public-Key Cryptosystems Provably Secure against Chosen Ciphertext Attack, Proc. Of STOC 90.
    • Proc. Of STOC 90
    • Naor, M.1    Yung, M.2
  • 26
    • 84974615931 scopus 로고    scopus 로고
    • One-way Functions are Necessary for Non-Trivial Zero-Knowledge Proofs
    • R. Ostrovsky and A. Wigderson, One-way Functions are Necessary for Non-Trivial Zero-Knowledge Proofs, in Proc. Of ISTCS 93.
    • Proc. Of ISTCS 93
    • Ostrovsky, R.1    Wigderson, A.2
  • 27
    • 33746160194 scopus 로고    scopus 로고
    • One-way Functions are Necessary and Sufficient for Secure Signatures
    • J. Rompel, One-way Functions are Necessary and Sufficient for Secure Signatures, in Proc. Of STOC 90.
    • Proc. Of STOC 90
    • Rompel, J.1
  • 28
    • 84974539088 scopus 로고    scopus 로고
    • Theory and Applications of Trapdoor Functions
    • A. Yao, Theory and Applications of Trapdoor Functions, in Proc. Of FOCS 82.
    • Proc. Of FOCS 82
    • Yao, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.