Trading group theory for randomness
STOC '85 Proceedings of the seventeenth annual ACM symposium on Theory of computing
The complexity of perfect zero-knowledge
STOC '87 Proceedings of the nineteenth annual ACM symposium on Theory of computing
How to prove yourself: practical solutions to identification and signature problems
Proceedings on Advances in cryptology---CRYPTO '86
Demonstrating possession of a discrete logarithm without revealing it
Proceedings on Advances in cryptology---CRYPTO '86
Minimum disclosure proofs of knowledge
Journal of Computer and System Sciences - 27th IEEE Conference on Foundations of Computer Science October 27-29, 1986
Subliminal-free authentication and signature
Lecture Notes in Computer Science on Advances in Cryptology-EUROCRYPT'88
Efficient zero-knowledged identification scheme for smart cards
Lecture Notes in Computer Science on Advances in Cryptology-EUROCRYPT'88
Lecture Notes in Computer Science on Advances in Cryptology-EUROCRYPT'88
Zero-knowledge proofs of identity
Journal of Cryptology
The knowledge complexity of interactive proof systems
SIAM Journal on Computing
Perfect zero-knowledge in constant rounds
STOC '90 Proceedings of the twenty-second annual ACM symposium on Theory of computing
A general zero-knowledge scheme
EUROCRYPT '89 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
EUROCRYPT '89 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Journal of the ACM (JACM)
Efficient zero-knowledge identification schemes for smart cards
The Computer Journal - Special issue on safety and security parallel computation
An almost-constant round interactive zero-knowledge proof
Information Processing Letters
Direct Minimum-Knowledge Computations
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
On Defining Proofs of Knowledge
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
On the Security of Beth's Identification Schemes against Active and Concurrent Adversaries
Mathematical Methods in Computer Science
Hi-index | 0.01 |
There is a great similarity between the zero-knowledgeproof of quadratic residuocity presented by Goldwasser-Micali-Rackoffand the graph isomorphism proof presented by Goldreich-Micali-Wigderson.There is also a resemblance between the zero-knowledge proofsof Fiat-Shamir, Chaum-Evertse-van de Graaf, Beth and Guillou-Quisquater.A similar observation holds for zero-knowledge proofs based onencryption: the 3-colourability proofs and the Hamiltonian-circuitproofs of Blum and Goldreich-Micali-Wigderson, and the Brassard-Chaum-Crepeauproof for SAT. Feige, Fiat and Shamir introduced the conceptof zero-knowledge proofs of knowledge. In this paper we presenta general zero-knowledge scheme which unifies all these Arthur-Merlinproofs.