Normal view MARC view ISBD view

Concurrent Zero-Knowledge [electronic resource] :With Additional Background by Oded Goldreich / by Alon Rosen.

by Rosen, Alon [author.]; SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Information Security and Cryptography, Texts and Monographs: Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2006.Description: XIII, 184 p. 24 illus. online resource.ISBN: 9783540329398.Subject(s): Computer science | Data structures (Computer science) | Information theory | Computer Science | Data Structures, Cryptology and Information Theory | Theory of ComputationDDC classification: 005.74 Online resources: Click here to access online
Contents:
A Brief Introduction to Zero-Knowledge (by Oded Goldreich) -- to Concurrent Zero-Knowledge -- Preliminaries -- c Proof Systems for -- c in Logarithmically Many Rounds -- A Simple Lower Bound -- Black-Box c Requires Logarithmically Many Rounds -- Conclusions and Open Problems -- A Brief Account of Other Developments (by Oded Goldreich).
In: Springer eBooksSummary: Zero-knowledge proofs are fascinating and extremely useful constructs. Their fascinating nature is due to their seemingly contradictory definition; zero-knowledge proofs are convincing and yet yield nothing beyond the validity of the assertion being proved. Their applicability in the domain of cryptography is vast. A fundamental question regarding zero-knowledge protocols is whether their security is preserved when many instances of the protocol are executed concurrently. The practical importance of this question, in the days of extensive Internet communication, seems clear. This question is also interesting from a theoretical viewpoint - in addition to being challenging from an algorithmic perspective, the study of zero-knowledge in the concurrent setting has contributed greatly to our understanding of the concurrent security of cryptographic protocols. Protocols that remain zero-knowledge when many instances are executed concurrently are called concurrent zero-knowledge, and this book is devoted to their study. The book presents constructions of concurrent zero-knowledge protocols, along with proofs of security. It also shows why "traditional" proof techniques (i.e., black-box simulation) are not suitable for establishing the concurrent zero-knowledge property of "message-efficient" protocols. The book features introductory and concluding chapters on zero-knowledge by Oded Goldreich.
Tags from this library: No tags from this library for this title. Add tag(s)
Log in to add tags.
    average rating: 0.0 (0 votes)
Item type Current location Call number Status Date due Barcode
MAIN LIBRARY
QA76.9.D35 (Browse shelf) Available

A Brief Introduction to Zero-Knowledge (by Oded Goldreich) -- to Concurrent Zero-Knowledge -- Preliminaries -- c Proof Systems for -- c in Logarithmically Many Rounds -- A Simple Lower Bound -- Black-Box c Requires Logarithmically Many Rounds -- Conclusions and Open Problems -- A Brief Account of Other Developments (by Oded Goldreich).

Zero-knowledge proofs are fascinating and extremely useful constructs. Their fascinating nature is due to their seemingly contradictory definition; zero-knowledge proofs are convincing and yet yield nothing beyond the validity of the assertion being proved. Their applicability in the domain of cryptography is vast. A fundamental question regarding zero-knowledge protocols is whether their security is preserved when many instances of the protocol are executed concurrently. The practical importance of this question, in the days of extensive Internet communication, seems clear. This question is also interesting from a theoretical viewpoint - in addition to being challenging from an algorithmic perspective, the study of zero-knowledge in the concurrent setting has contributed greatly to our understanding of the concurrent security of cryptographic protocols. Protocols that remain zero-knowledge when many instances are executed concurrently are called concurrent zero-knowledge, and this book is devoted to their study. The book presents constructions of concurrent zero-knowledge protocols, along with proofs of security. It also shows why "traditional" proof techniques (i.e., black-box simulation) are not suitable for establishing the concurrent zero-knowledge property of "message-efficient" protocols. The book features introductory and concluding chapters on zero-knowledge by Oded Goldreich.

There are no comments for this item.

Log in to your account to post a comment.
@ Jomo Kenyatta University Of Agriculture and Technology Library

Powered by Koha