Zero-knowledge proofs of identity and veracity of transaction receipts There are two equally important, related, functions involved in the control of assets and resources. One of these is the verification of a potential user's... GJ Simmons,GB Purdy - Workshop on Advances in Cryptology-...
Zero knowledge proofs of identity - Feige, Fiat, et al. - 1988 () Citation Context ... Λ and s ∈ S, and by some public functions U : R 7→ X, V : S × R × G 7→ Y and W : Λ× G × Y 7→ X. This is as described on Fig. 1. Examples of such Σ-protocols ...
The security of the improved algorithm is based on the 3-SAT NP-hard problem while the security of old algorithm was based on the difficulty of solving random Boolean OR operations. In addition, the improved visual zero-knowledge proof of identity scheme is also efficient in generating shares ...
This article provides a primer on zero-knowledge proofs, portable identity, problems in prevailing identity solutions, blockchain-based zero-knowledge proof powered portable identity solutions, trustless authentication and the process of creating password credentials. What is a zero-knowledge...
Fiat, A. Shamir Zero knowledge proofs of identity J. Cryptology, 1 (2) (1988), pp. 77-94 View in ScopusGoogle Scholar [21] U. Feige, A. Shamir Zero knowledge proofs of knowledge in two rounds Advances in Cryptology: CRYPTO '89 Proc., Springer, Berlin (1990), pp. 526-544 Cross...
D. Chaum, I. Damgård and J. van de Graaf,Multiparty Computations Ensuring Secrecy of each Party’s Input and Correctness of the Output, Proc. of Crypto 87, pp. 462. Google Scholar U. Feige, A. Fiat and A. Shamir,Zero-Knowledge Proofs of Identity, STOC 87, pp. 210–217. ...
1. The paper mainly makes a study on the secure communication in the mobile P2P network,with One-Round Zero-Knowledge Proofs for the identity authentication. 本文主要研究了采用单轮零知识证明方式进行身份认证,来实现移动计算环境中P2P网络的安全通信,并分析了与其相关的性能及效率。
Summary: Demonstrating in zero-knowledge the possession of digital signatures has many cryptographic applications such as anonymous anthentication, identity escrow, publicly verifiable secret sharing and group signature. This paper presents a general construction of zero-knowledge proof of possession of dig...
These interactive proofs do not require any public keys, and make no assumptions about the prover computational ability. We extend iZK (and iWI) interactive proofs to iZK (and iWI) proofs of identity: These are methods to prove identity that remain secure even if the prover... 展开 ...
Zero-knowledge proofs have numerous applications in the field of cybersecurity, enabling secure and privacy-preserving solutions for various challenges: Authentication and access control:Zero-knowledge proofs can be used for authentication purposes, where a user proves their identity or authorization without...