Concurrent Zero-Knowledge

@article{Dwork1998ConcurrentZ,
  title={Concurrent Zero-Knowledge},
  author={Cynthia Dwork and Moni Naor and Amit Sahai},
  journal={IACR Cryptology ePrint Archive},
  year={1998},
  volume={1999},
  pages={23}
}
Concurrent executions of a zero-knowledge protocol by a ainSle prover (with one or more verifiers) may leak information and may not be zero-knowledge in toto; for example, in the case of zero-knowledge interactive proofs or arguments, the interactions remain proofs but may fail to remain zeroltnowlcd~e, This paper addresses the problem of achieving concurrent zero-knowledge, We introduce timing in order to obtain zero-knowledge in concurrent executions. We assume that the adversary is… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-10 OF 17 CITATIONS

Timed Encryption and Its Application

  • IACR Cryptology ePrint Archive
  • 2010
VIEW 4 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Lower Bounds For Concurrent Zero Knowledge*

VIEW 6 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

Concurrent Zero Knowledge Proofs with Logarithmic Round-Complexity

  • IACR Cryptology ePrint Archive
  • 2002
VIEW 5 EXCERPTS
CITES BACKGROUND

Universal Encrypted Deniable Authentication Protocol

  • I. J. Network Security
  • 2009
VIEW 4 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

Group Oriented Deniable Authentication Protocol

  • First International Multi-Symposiums on Computer and Computational Sciences (IMSCCS'06)
  • 2006
VIEW 4 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

Security and Privacy on Blockchain

  • ACM Comput. Surv.
  • 2019
VIEW 1 EXCERPT
CITES BACKGROUND

Secure Deniable Authentication Protocol Based on ElGamal Cryptography

  • 2008 International Conference on Information Security and Assurance (isa 2008)
  • 2008
VIEW 1 EXCERPT
CITES METHODS

References

Publications referenced by this paper.
SHOWING 1-3 OF 3 REFERENCES

Encapsulated Key Escrow

VIEW 8 EXCERPTS
HIGHLY INFLUENTIAL

On the Composition of Zero-Knowledge Proof Systems

  • SIAM J. Comput.
  • 1996
VIEW 3 EXCERPTS
HIGHLY INFLUENTIAL

Wagner,Time-lock puzzles and time-release Crypto

R. L. Rivest, D.A.A. Shamir
  • 1996
VIEW 3 EXCERPTS
HIGHLY INFLUENTIAL