Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,400,050 papers from all fields of science
Search
Sign In
Create Free Account
Proof of knowledge
In cryptography, a proof of knowledge is an interactive proof in which the prover succeeds 'convincing' a verifier that the prover knows something…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
18 relations
Abstract machine
Cryptographic protocol
Cryptography
Digital credential
Expand
Broader (1)
Computational complexity theory
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Sigma Protocols and Commitment Schemes
D. Butler
,
Andreas Lochbihler
Arch. Formal Proofs
2019
Corpus ID: 207756752
2017
2017
Distance-bounding Identification
Ahmad Ahmadi
,
R. Safavi-Naini
International Conference on Information Systems…
2017
Corpus ID: 36152283
Distance bounding (DB) protocols allow a prover to convince a verifier that they are within a distance bound. We propose a new…
Expand
2016
2016
ODIN
Moreno Ambrosin
,
P. Braca
,
M. Conti
,
R. Lazzeretti
ACM Trans. Internet Techn.
2016
Corpus ID: 1546833
The large spread of sensors and smart devices in urban infrastructures are motivating research in the area of the Internet of…
Expand
2012
2012
Anonymous subscription system with strengthened security
Liu Xin
2012
Corpus ID: 167265807
There has been no efficient anonymous subscription system which supports customers to purchase some service for a number of times…
Expand
2012
2012
Digital Signatures from Challenge-Divided Sigma-Protocols
A. Yao
,
Yunlei Zhao
IACR Cryptology ePrint Archive
2012
Corpus ID: 27373699
Digital signature is one of the basic primitives in cryptography. A common paradigm of obtaining signatures, known as the Fiat…
Expand
2010
2010
Multifactor Identity Verification Using Aggregated Proof of Knowledge
Abhilasha Bhargav-Spantzel
,
A. Squicciarini
,
Rui Xue
,
E. Bertino
IEEE Transactions on Systems Man and Cybernetics…
2010
Corpus ID: 35143989
The problem of identity theft, that is, the act of impersonating others' identities by presenting stolen identifiers or proofs of…
Expand
2009
2009
Identity-Based Secret Signature Scheme
Byoungcheon Lee
,
Jin Li
,
Kwangjo Kim
Fourth International Conference on Computer…
2009
Corpus ID: 15791005
Secret signature, proposed by Lee et al. [11], is a new signature scheme which provides signature privacy and public provability…
Expand
2009
2009
Efficiency Limitations for Sigma-Protocols for Group Homomorphisms
E. Bangerter
,
J. Camenisch
,
S. Krenn
IACR Cryptology ePrint Archive
2009
Corpus ID: 39221162
2002
2002
Securing "Encryption + Proof of Knowledge" in the Random Oracle Model
Masayuki Abe
The Cryptographer's Track at RSA Conference
2002
Corpus ID: 11037352
To create encryption schemes that offer security against adaptive chosen ciphertext attacks, this paper shows how to securely…
Expand
1998
1998
Proofs of membership vs. proofs of knowledge
G. D. Crescenzo
,
R. Impagliazzo
Proceedings. Thirteenth Annual IEEE Conference on…
1998
Corpus ID: 34586602
We investigate the relationship between interactive proofs of membership and interactive proofs of knowledge. Previous results in…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE