Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 223,670,370 papers from all fields of science
Search
Sign In
Create Free Account
Zero-knowledge proof
Known as:
Zero knowledge proof
, Zero knowledge proofs
, Zero-knowledge protocol
Expand
In cryptography, a zero-knowledge proof or zero-knowledge protocol is a method by which one party (the prover) can prove to another party (the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Alice and Bob
Anonymous veto network
Authentication
Blind signature
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2014
Review
2014
Foundations of Security Analysis and Design VII
A. Aldini
,
R. Gorrieri
Lecture Notes in Computer Science
2014
Corpus ID: 20566
With testing, a system is executed with a set of selected stimuli, and observed to determine whether its behavior conforms to the…
Expand
Highly Cited
2013
Highly Cited
2013
Homing spread: Community home-based multi-copy routing in mobile social networks
Jie Wu
,
Mingjun Xiao
,
Liusheng Huang
Proceedings IEEE INFOCOM
2013
Corpus ID: 6119014
A mobile social network (MSN) is a special delay tolerant network (DTN) composed of mobile nodes with social characteristics…
Expand
Review
2008
Review
2008
The Contrast‐sensitivity of Knowledge Ascriptions
J. Schaffer
2008
Corpus ID: 146599634
Knowledge ascriptions are contrast‐sensitive. One natural explanation for this is that the knowledge relation is contrastive (s…
Expand
2008
2008
Computational Soundness of Symbolic Zero-Knowledge Proofs Against Active Attackers
M. Backes
,
Dominique Unruh
IEEE Computer Security Foundations Symposium
2008
Corpus ID: 7541964
The abstraction of cryptographic operations by term algebras, called Dolev-Yao models, is essential in almost all tool-supported…
Expand
Highly Cited
2004
Highly Cited
2004
Secure implementation of identification systems
Samy Bengio
,
G. Brassard
,
Y. Desmedt
,
C. Goutier
,
J. Quisquater
Journal of Cryptology
2004
Corpus ID: 27865686
In this paper we demonstrate that widely known identification systems, such as the public-file-based Feige-Fiat-Shamir scheme…
Expand
Highly Cited
2004
Highly Cited
2004
Control and performance evaluation of a clutch servo system with hydraulic actuation
M. Montanari
,
F. Ronchi
,
C. Rossi
,
A. Tilli
,
A. Tonielli
2004
Corpus ID: 54956816
Highly Cited
2002
Highly Cited
2002
Technology Adoption, Human Capital, and Growth Theory
C. Papageorgiou
2002
Corpus ID: 17167572
The paper explores a model in which growth is determined by a combination of human capital and technology adoption. At the heart…
Expand
Highly Cited
1991
Highly Cited
1991
Fully parallelized multi prover protocols for NEXP-time
D. Lapidot
,
A. Shamir
[] Proceedings 32nd Annual Symposium of…
1991
Corpus ID: 21348334
A major open problem in the theory of multiprover protocols is to characterize the languages which can be accepted by fully…
Expand
1990
1990
How to Utilize the Randomness of Zero-Knowledge Proofs
T. Okamoto
,
K. Ohta
Annual International Cryptology Conference
1990
Corpus ID: 7529003
In zero-knowledge interactive proofs, a lot of randomized information is exchanged between the prover and the verifier, and the…
Expand
Highly Cited
1984
Highly Cited
1984
A study of the "value" systems of behavioral scientists.
L. Krasner
,
A. Houts
1984
Corpus ID: 55015355
This article reports the results of an investigation of the "value" systems of two groups of psychologists: (a) a behavioral…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE