skip to main content
10.1145/335305.335334acmconferencesArticle/Chapter ViewAbstractPublication PagesstocConference Proceedingsconference-collections
Article
Free Access

Resettable zero-knowledge (extended abstract)

Authors Info & Claims
Published:01 May 2000Publication History
First page image

References

  1. 1.M. Bellaxe and O. Goldreich, Proofs of Computational Ability. Crypto '92, August 1992. Full version available on the Theo~ of C~ptogr~phy Lib~'a~y, http://philby .ucsd. sdu/01d, html, Record Arc-03.Google ScholarGoogle Scholar
  2. 2.G. Brassard, D. Chaum and C. Cr~peau. Minimum Disclosure Proofs of Knowledge. JCSS, Vol. 37, No. 2, pages 156-189, 1988. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. 3.R. Canetti, O. Goldreich, S. Goldwasser, and S. Micali. Resettable Zero-Knowledge. BCC'C', TR99-042, 1999.Also available from the Theory of Cryptography Library. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. 4.I. Damg&rd. Concurrent Zero-Knowledge in Easy in Practics. Theory of Cryptography Library, 99-14, 3une 1999. http: } }philby. ucsd. e du/crypt 01 ib/1999, html.Google ScholarGoogle Scholar
  5. 5.I. Damg~-rd. Efficient Concurrent Zero-Knowledge in the Auxiliary String Model. Eurocrypt 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. 6.D. Dolev, C. Dwork, and M. Naor. Non-Malleable Cryptography. In ~S,d STOC, pages 542-552, 1991. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. 7.C. Dwork, and A. Sahai. Concurrent Zero-Knowledge: Reducing the Need for Timing Constraints. In Crypto98, Springer LNCS 1462. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. 8.C. Dwork, M. Naor, and A. Sahai. Concurrent Zero- Knowledge. In $0th STOC, pages 409-418, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. 9.U. Feige. Ph.D. thesis, Weizmann Institute of Science.Google ScholarGoogle Scholar
  10. 10.U. Feige, A. Fiat and A. Shamir. Zero-Knowledge Proofs of Identity. Jour"nal of Cryl~tology, Vol. 1, 1988, pages 77-94. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. 11.U. Feige and A. Sharnir. Witness Indistinguishability and Witness Hiding Protocols. In ,~nd $TOC, pages 416-426, 1990. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. 12.A. Fiat and A. Shamir. How to Prove Yourself: Practical Solution to Identification and Signature Problems. In CRYPT086, Springer-Verlag LNCS263, pages 186-189, 1987. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. 13.O. Goldreich. Foundation of C~jptography - F, ag- ~'nentz of a Book. February 1996. Revised version, January 1998. Both versions axe available from http://theory, lcs. mi~. sdu/~oded/frag, h~ml.Google ScholarGoogle Scholar
  14. 14.O. Goldreich, S. Goldwa~ser, and S. Micadi. How to Construct Random Functions. JACM, Vol. 33, No. 4, pages 792-807, 1986. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. 15.O. Goldreich, S. Goldwasser, and S. Micali. Interleaved Zero-Knowledge in the Public-Key Model. ECCC, TR99- 024, 1999. Also available from the Theor~j of Cr~yptography Library.Google ScholarGoogle Scholar
  16. 16.O. Goldreich and A. Kahan. How to Construct Constant- Round Zero-Knowledge Proof Systems for NP.Jour. of Cryptology, Vol. 9, No. 2, pages 167-189, 1996.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. 17.O. Goldreich and H. Krawcsyk. On the Composition of Zero- Knowledge Proof Systems. SIAM J. Computing, Vol. 25, No. 1, pages 169-192, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. 18.O. Goldreich and L.A. Levin. Haxd-core Predicates for any One-Way Function. In 215t STOC, pages 25-32, 1989. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. 19.O. Goldreich, S. Micali and A. Wigderson. Proofs that Yield Nothing But Their Validity or All Languages in NP Have Zero-Knowledge Proof Systems. JACM, Vol. 38, No. 1, pp. 691-729, 1991. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. 20.O. Goldreich and Y. Oren. Definitions and Properties of Zero-Knowledge Proof Systems. Jour. of Cryptology, Vol. 7, No. 1, pages 1-32, 1994.Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. 21.S. Goldwasser and S. Micali. Patent applications on Inand Internet Zero-Knotvledge and Lo~v-Knotoledge Proofs ~.d P~oto~oZ, (6/ll/sg).Google ScholarGoogle Scholar
  22. 22.S. Goldwasser, S. Micali and C. Rackoff. The Knowledge Complexity of Interactive Proof Systems. SIAM J. Comput., Vol. 18, No. 1, pp. 186-208, 1989. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. 23..1. H~stad, R. Impagliazzo, L.A. Levin and M. Luby. Construction of Pseudorandom Generator from any One.Way Function. SIAM Jour. on C'o~r~p~ting, Vol. 28 (4), pages 1364-1396, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. 24.3. Kilian, E. Petrank, and C. Rackoff. Lower Bounds for Zero-Knowledge on the Internet. In Sgth FOC$, pages 484- 492, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. 25.M. Naor. Bit Commitment using Pseudorandom Generators. Jolt. of Cryptology, Vol. 4, pages 151-158, 1991.Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. 26.It. Richardson and 3. Kilian. On the Concurrent Composition of Zero-Knowledge Proofs. In B~.o(Tr~p~99, Springer LNCS 1592, pages 415-413. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. 27.M. Tompa and H. Woll. Random Self-Reducibility and Zero- Knowledge Interactive Proofs of Possession of Information. In 28th FOC$, pages 472-482, 1987.Google ScholarGoogle Scholar
  28. 28.A.C. Yao. Theory and Application of Trapdoor Functions. In 23~d FO C$, pages 80-91, 1982.Google ScholarGoogle Scholar

Index Terms

  1. Resettable zero-knowledge (extended abstract)

                Recommendations

                Comments

                Login options

                Check if you have access through your login credentials or your institution to get full access on this article.

                Sign in
                • Published in

                  cover image ACM Conferences
                  STOC '00: Proceedings of the thirty-second annual ACM symposium on Theory of computing
                  May 2000
                  756 pages
                  ISBN:1581131844
                  DOI:10.1145/335305

                  Copyright © 2000 ACM

                  Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                  Publisher

                  Association for Computing Machinery

                  New York, NY, United States

                  Publication History

                  • Published: 1 May 2000

                  Permissions

                  Request permissions about this article.

                  Request Permissions

                  Check for updates

                  Qualifiers

                  • Article

                  Acceptance Rates

                  STOC '00 Paper Acceptance Rate85of182submissions,47%Overall Acceptance Rate1,469of4,586submissions,32%

                  Upcoming Conference

                  STOC '24
                  56th Annual ACM Symposium on Theory of Computing (STOC 2024)
                  June 24 - 28, 2024
                  Vancouver , BC , Canada

                PDF Format

                View or Download as a PDF file.

                PDF

                eReader

                View online with eReader.

                eReader