Skip to main content
In this paper we give techniques for recycling random bits both in the interactive and in the non-interactive model for perfect zero-knowledge proofs. Our first result is a non-interactive perfect zercknowledge proof system €or proving... more
    • by 
    • Zero-Knowledge Proofs
    • by 
    •   4  
      Zero-Knowledge ProofsProof of knowledgeBlind SignatureSignature Scheme
We consider the problem of designing an efficient oblivious transfer (OT) protocol that is provably secure in a concurrent setting, i.e., where many OT sessions may be running concurrently with their messages interleaved arbitrarily.... more
    • by 
    •   14  
      Computer ScienceCryptographyAuthenticationProtocols
CAPTCHA is a test that can tell humans and computer programs apart automatically. The aim is to allow the server to identify the visitor is a human or a computer, and only provide services to human. It can improve the current server... more
    • by 
    •   9  
      Information SecurityNetwork SecurityZero-Knowledge ProofsBiological Motion
Recent technological advances have given rise to the popularity and success of cloud storage. However, the prospect of outsourcing an increasing amount of data to a third party and the abstract nature of the cloud foster the proliferation... more
    • by 
    •   12  
      Computer ScienceTheorem ProvingGlobal Positioning SystemElliptic curves
This paper describes a login system utilizing Two Factor Authentication and Zero Knowledge Proof using Schnorr NIZK. The proposed system is designed to prevent password leak when being sent over insecure network or when used in an... more
    • by  and +1
    •   3  
      Applied CryptographyZero-Knowledge ProofsTwo-factor Authentication
This is paper is a draft. It is an extended version of a shorter paper of the same title. It differs from the short paper in the following regards:
    • by 
    •   6  
      Applied MathematicsFunctional ProgrammingComputer SoftwareZero-Knowledge Proofs
and multimedia security since 1995. Research issues and practical experiences were the topics of interest, with a special focus on the security of advanced technologies, such as wireless and multimedia communications.
    • by 
    •   7  
      Zero-Knowledge ProofsComparative AnalysisComputational EfficiencyBinary Tree
... SECURITY MICROPROCESSOR MINIMIZING BOTH TRANSMISSION AND MEMORY ... This paper proposes a new scheme which requires the storage of only one authentication number in eachsecurity microprocessor and the check of only one witness number.... more
    • by 
    • Zero-Knowledge Proofs
Wireless Sensor Networks (WSNs) offer an excellent opportunity to monitor environments, and have a lot of interesting applications, some of which are quite sensitive in nature and require full proof secured environment. The security... more
    • by 
    •   8  
      Wireless Sensor NetworksCryptographyProtocolsZero-Knowledge Proofs
There is a great similarity between the zero-knowledge proof of quadratic residuocity presented by Goldwasser-Micali-Rackoff and the graph isomorphism proof presented by Goldreich-Micali-Wigderson. There is also a resemblance between the... more
    • by 
    •   11  
      MathematicsComputer ScienceComplexity TheoryCombinatorics
    • by 
    • Zero-Knowledge Proofs
Privacy-Preserving ledgers are Distributed Ledgers designed to preserve confidentiality about the nature of the transactions conducted, including the value, the actors involved, the asset balance on the ledger, as well as the sourcing... more
    • by 
    •   4  
      Privacy and data protectionZero-Knowledge ProofsInternet of Things (IoT)Distributed Ledger Technology
In this paper we extend the notion of zero knowledge proofs of membership (which reveal one bit of information) to zero knowledge proofs of knowledge (which reveal no information whatsoever). After formally defining this notion, we show... more
    • by 
    •   2  
      Provable SecurityZero-Knowledge Proofs
We propose an approach using elliptic curve-based zero-knowledge proofs in e-commerce applications. We demonstrate that using elliptic curved-based zeroknowledge proofs provide privacy and more security than other existing techniques. The... more
    • by 
    •   12  
      Computer SciencePrivacyWatermarkingCryptography
The performance of a distributed system is affected by the various functions of its components. The interaction between components such as network nodes, computer systems and system programs is examined with special interest accorded to... more
    • by 
    •   87  
      EngineeringTechnologyArchitectureGovernment
In this paper we formally define proof systems for functions and develop an example of such a proof with a constant number of rounds, which we modify (at no extra communication cost) into an identification scheme with secret key exchange... more
    • by 
    •   9  
      Pure MathematicsCryptologyZero-Knowledge ProofsChip
We present protocols for two flavors of oblivious transfer (OT): the Rabin and 1-out-of-2 OT based on the assumptions related to security of the McEliece cryptosystem and two zero-knowledge identification (ZKID) schemes, Stern's from... more
    • by 
    •   3  
      Coding TheoryZero-Knowledge ProofsOblivious Transfer
The input to the Graph Clustering Problem consists of a sequence of integers m 1 ; :::; m t and a sequence of P t i=1 m i graphs. The question is whether the equivalence classes, under the graph isomorphism relation, of the input graphs... more
    • by 
    •   6  
      EngineeringCryptographyMathematical SciencesZero-Knowledge Proofs
In this project, we study the result presented in [2] that “all languages in NP have zeroknowledge interactive proof systems”. In particular, we have studied a general method for constructing ZKP for the well-known NP-complete language,... more
    • by 
    •   3  
      Zero-Knowledge ProofsSecure Multiparty ComputationInteractive Proof Systems
A set of vertices in a graph is a dominating set if every vertex outside the set has a neighbor in the set. The domatic number problem is that of partitioning the vertices of a graph into the maximum number of disjoint dominating sets.... more
    • by 
    •   7  
      Approximation AlgorithmsZero-Knowledge ProofsEfficient Algorithm for ECG CodingProbabilistic Analysis
We solve the nonlinear Schrodinger equation with an unsupervised neural network with the optical axis position z and time t as inputs. The network outputs the real and imaginary components of the solution. Unsupervised training aims to... more
    • by 
    •   15  
      Neural NetworksNeural NetworkNumerical SimulationZero-Knowledge Proofs
The Ethereum block chain as a decentralized platform is so successful that many applications deployed on it. However, for the inherent transparency properties and the lack of privacy, deploying a financial application on top of it is... more
    • by 
    •   12  
      Information TechnologyElectronicsEncryptionComputational Mathematics
A basic question concerning zero-knowledge proof systems is whether their (sequential and/or parallel) composition is zero-knowledge too. This question is not only of natural theoretical interest, but is also of great practical importance... more
    • by 
    •   5  
      Pure MathematicsZero-Knowledge ProofsLower BoundCOL
    • by 
    •   6  
      MathematicsComputer ScienceCryptologyZero-Knowledge Proofs
The main aim of cryptography is to provide the frameworks and solutions for information security.
    • by 
    •   2  
      Computer ScienceZero-Knowledge Proofs
Secure identification is an important security issue to avoid computer fraud due to masquerading. This can be achieved with zero-knowledge based smart cards. We present very efficient new zero-knowledge schemes in a general algebraic... more
    • by 
    •   8  
      ComplexityCryptographySafetyIdentification
We propose an approach using elliptic curve-based zero-knowledge proofs in e-commerce applications. We demonstrate that using elliptic curved-based zeroknowledge proofs provide privacy and more security than other existing techniques. The... more
    • by 
    •   12  
      Computer SciencePrivacyWatermarkingCryptography
    • by 
    •   3  
      Applied CryptographyZero-Knowledge ProofsTwo-factor Authentication
Research partly supported by NSF CAREER Award CNS-0447808.
    • by 
    •   7  
      Public RelationsZero-Knowledge ProofsPKCPublic key cryptography
    • by 
    •   7  
      Pure MathematicsElliptic curvesIdentificationZero-Knowledge Proofs
With more integration in VLSI technology, Intellectual Property (IP) cores are reused to meet the customer's specifications in time. For intellectual property protection (IPP), various kinds of IP marks, such as watermarks,... more
    • by 
    •   3  
      Intellectual PropertyIntellectual Property ProtectionZero-Knowledge Proofs
In the bare public-key model (BPK in short), each verifier is assumed to have deposited a public key in a file that is accessible by all users at all times. In this model, introduced by Canetti et al. [STOC 2000], constant-round black-box... more
    • by 
    •   4  
      CryptoCryptologyZero-Knowledge ProofsStandard Model
The notion of resettable zero-knowledge (rZK) was introduced by Canetti, Goldreich, Goldwasser and Micali (FOCS'01) as a strengthening of the classical notion of zero-knowledge. A rZK protocol remains zero-knowledge even if the verifier... more
    • by 
    •   5  
      Zero-Knowledge ProofsSmart CardSmartcardSecure Computation
Applications such as e-commerce payment protocols, electronic contract signing, and certified e-mail delivery require that fair exchange be assured. A fair-exchange protocol allows two parties to exchange items in a fair way so that... more
    • by 
    •   5  
      Distributed ComputingZero-Knowledge ProofsE CommerceFair Exchange
Phishing attack is a kind of identity theft trying to steal confidential data. Existing approaches against phishing attacks cannot prevent real-time phishing attacks. This paper proposes an Anti-Phishing Authentication (APA) technique to... more
    • by 
    •   6  
      User InterfaceInformation Systems SecurityZero-Knowledge ProofsIdentity Theft
In identification protocols with public verifier coins (like Fiat-Shamir), a passive adversary watch- ing the communication gains information intended only for the verifier. On the other hand, private coin protocols with fewer than three... more
    • by 
    •   3  
      Zero-Knowledge ProofsSmart CardBlind Identification
    • by 
    •   8  
      Digital SignaturePure MathematicsCryptologyZero-Knowledge Proofs
The notion of Zero Knowledge Proofs (of knowledge) [ZKP] is central to cryptography; it provides a set of security properties that proved indispensable in concrete protocol design. These properties are defined for any given input and also... more
    • by  and +1
    •   6  
      Protocol DesignZero-Knowledge ProofsStandard ModelIT Security
Market research surveys report that 75% of hacks occur at the application layer. Of the multiple vulnerabilities that exist in Web application software, proper authentication of the client and the server to each other is fundamental to... more
    • by 
    •   11  
      Computer ScienceInformation SecurityWeed ManagementZero-Knowledge Proofs
The advent of the IoT with an estimated 50 billion internet enabled devices by the year 2020 raises questions about the suitability and scalability of existing mechanisms to provide privacy, data integrity and end-entity authentication... more
    • by 
    •   11  
      Computer ScienceWireless Sensor NetworksInternet of ThingsData Privacy
With an estimated 50 billion internet-enabled devices deployed by 2020, the arrival of the Internet of Things (IoT) or Internet of Everything (IoE) raises many questions regarding the suitability and adaptability of current computer... more
    • by 
    •   15  
      Computer SciencePrivacyEmbedded SystemsWireless Sensor Networks
A method of making a gasket assembly of enhanced sealing characteristics comprising the steps of providing a gasket body having an expansive metallic core and at least one compressible fiber-elastomer facing layer and defining at least... more
    • by 
    •   6  
      Number TheoryZero-Knowledge ProofsWCCSignature Scheme
This paper gives two distinct proofs of an exponential separation between regular resolution and unrestricted resolution. The previous best known separation between these systems was quasi-polynomial.
    • by 
    •   5  
      Zero-Knowledge ProofsProof ComplexityLower BoundTheory of Computing
We consider a type of zero-knowledge protocols that are of interest for their practical applications within networks like the Internet: efficient zero-knowledge arguments of knowledge that remain secure against concurrent... more
    • by 
    •   2  
      Zero-Knowledge ProofsModular exponentiation
Despite their widespread usage in block cipher security, linear and differential cryptanalysis still lack a robust treatment of their success probability, and the success chances of these attacks have commonly been estimated in a rather... more
    • by 
    •   32  
      Digital SignatureStatistical AnalysisComputer SecurityCryptography
We present the first dynamic universal accumulator that allows (1) the accumulation of elements in a DDH-hard group G and (2) one who knows x such that y = g x has -or has not -been accumulated, where g generates G, to efficiently prove... more
    • by 
    •   2  
      Zero-Knowledge ProofsAccess Control Policy
We initiate a theoretical study of the census problem. Informally, in a census individual respondents give private information to a trusted party (the census bureau), who publishes a sanitized version of the data. There are two... more
    • by 
    •   31  
      Digital SignatureStatistical AnalysisComputer SecurityCryptography
PDP is a technique designed for CSP to show that complete file of the client is in secured state without downloading the whole file. PDP scheme of multi cloud includes multiple csp’s to mutually store and maintain the... more
    • by 
    •   3  
      Zero-Knowledge ProofsPdpTpa
We present new and efficient concurrent zero-knowledge protocols in the timing model. In contrast to earlier works-which through artificially-imposed delays require every protocol execution to run at the speed of the slowest link in the... more
    • by 
    • Zero-Knowledge Proofs