Non-Interactive Zero-Knowledge with Preprocessing
- 1 January 1990
- book chapter
- Published by Springer Nature
- p. 269-282
- https://doi.org/10.1007/0-387-34799-2_21
Abstract
No abstract availableKeywords
This publication has 10 references indexed in Scilit:
- The Notion of Security for Probabilistic CryptosystemsSIAM Journal on Computing, 1988
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message AttacksSIAM Journal on Computing, 1988
- Non-interactive zero-knowledge and its applicationsPublished by Association for Computing Machinery (ACM) ,1988
- Non-Interactive Zero-Knowledge Proof SystemsPublished by Springer Nature ,1988
- Proofs that yield nothing but their validity and a methodology of cryptographic protocol designPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1986
- The knowledge complexity of interactive proof-systemsPublished by Association for Computing Machinery (ACM) ,1985
- How to Generate Cryptographically Strong Sequences of Pseudorandom BitsSIAM Journal on Computing, 1984
- Probabilistic encryptionJournal of Computer and System Sciences, 1984
- Theory and application of trapdoor functionsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1982
- Communication Theory of Secrecy Systems*Bell System Technical Journal, 1949