Zero knowledge proofs of identity
STOC '87 Proceedings of the nineteenth annual ACM symposium on Theory of computing
Hi-index | 0.00 |
The paper deals with automated methods for the design of security protocols and their design using zero knowledge protocols, or protocols, where it is possible to use zero knowledge protocols such as subprotocols. Specific emphasis is placed on the use of compositional method. The paper also include the example of protocol design.