skip to main content
10.1145/258533.258635acmconferencesArticle/Chapter ViewAbstractPublication PagesstocConference Proceedingsconference-collections
Article
Free Access

Linear zero-knowledge—a note on efficient zero-knowledge proofs and arguments

Authors Info & Claims
Published:04 May 1997Publication History
First page image

References

  1. 1.L. Babai, L. Fortnow, L. Levin and M. Szegedi: Checking Computations in Poly-logarithmic Time, Proceedings of STOC '91. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. 2.M. Bellare, S. Micali and R. Ostrovsky: The (True) Complexity of Statistical Zero-Knowledge, Proceedings of STOC '90, pp. 494-502. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. 3.M. Bellare and O. Goldreich: On Defining Proofs of Knowledge, Proceedings of Crypto '92, Springer Verlag LNCS, vol. 740, pp. 390-420. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. 4.J. Boyar, G. Brassard and R. Peralta: Subquadratic Zero-Knowledge, Journal of the ACM, November 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. 5.G. Brassard, D. Chaum and C. Cr~peau: Minimum Disclosure Proofs of Knowledge, JCSS, vol.37, pp. 156- 189, 1988. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. 6.D. Chaum, I. Damg~rd and J. van de Graaf: Multiparty Computations ensuring Privacy of each Party's input and Correctness of the Result, Proceedings of Crypto '87, Springer Verlag LNCS, vol. 293, pp. 87-119. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. 7.C. Cr~peau, J. van de Graaf and A. Tapp: Comitted Oblivious 7kansfer and Private Multiparty Computation, Proceedings of Crypto 95, Springer Verlag LNCS series, vol. 963. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. 8.R. Cramer, I. Damg~rd and B. Schoenmakers: Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols, Proceedings of Crypto '94, Springer verlag LNCS, vol. 839, pp. 174-187. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. 9.R. Cramer: Modular Design of Secure yet Practical Cryptographic Protocols, Ph.D.-thesis, CWI & Uni. of Amsterdam, January 1997.Google ScholarGoogle Scholar
  10. 10.I. Damg&rd, O. Goldreich, T. Okamoto and A. Wigderson: Honest Verifier vs. Dishonest Verifier in Public Coin Zero Knowledge Proofs, Proceedings of Crypto '95, Springer Verlag LNCS, vol. 963, pp. 325-338. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. 11.I. Damg&rd and B. Pfitzmann: On Soundness of Iterated Interactive Arguments and an Ej~icient Zero- Knowledge Argument for NP, manuscript, February 1997.Google ScholarGoogle Scholar
  12. 12.I.Damg~d, T.P. Pedersen and B.Pfitzmann: Statistical Secrecy and Multi-Bit Commitments, BRICS report series RS-96-45, available at http://www.brics.dk. To appear in IEEE Trans. Info.TheoryGoogle ScholarGoogle Scholar
  13. 13.V. Dime and M. Hellman: New Directions in Cryptography, IEEE Transactions on Information Theory IT-22 (6): 644-654, 1976.Google ScholarGoogle Scholar
  14. 14.T. ElGamal, A Public-Key Cryptosystem and a Signature Scheme based on Discrete Logarithms, IEEE Transactions on information Theory, IT-31 (4): 469- 472, 1985.Google ScholarGoogle ScholarCross RefCross Ref
  15. 15.U. Feige and A. Shamir: Witness Indistinguishable and Witness Hiding Protocols, Proceedings of STOC '90, pp. 416-426. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. 16.U. Feige and A. Shamir: Zero-Knowledge Proofs of Knowledge in Two Rounds, Proceedings of Crypto '89, Springer Verlag LNCS, vol. 435, pp. 526-544. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. 17.U. Feige, A. Fiat and A. Shamir: Zero-Knowledge Proofs of Identity, Journal of Cryptology i (1988) 77- 94. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. 18.O. Goldreich, S. Micali and A. Wigderson: Proofs that yield Nothing but their Validity and a Methodology of Cryptographic Protocol Design, Proceedings of FOCS '86, pp. 174-187. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. 19.O. Goldreich, S. Micali and A. Wigderson: How to Play Any Mental Game or a Completeness Theorem for Protocols with Honest Majority, Proceedings of STOC '87, ACM, pp. 218-229. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. 20.O. Goldreich and A. Kahan: How to Construct Constant-Round Zero-Knowledge Proof Systems for NP, Journal of Cryptology, (1996) 9: 167-189.Google ScholarGoogle ScholarCross RefCross Ref
  21. 21.S. Goldwasser, S. Micali and C. Rackoff: The Knowledge Complexity of Interactive Proof Systems, SIAM J.Computing, Vol. 18, pp. 186-208, 1989. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. 22.J. Kilian, S. Micali, and R. Ostrovsky: Minimum resource zero-knowledge proofs, Proceedings of FOCS '89, pp. 474-479. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. 23.M. Naor: Bit commitment using randomness, Journal of Cryptology, (1991) 4: 151-158.Google ScholarGoogle Scholar
  24. 24.J. Kilian: A note on E. Oicient Proofs and Arguments, Proceedings of STOC '92.Google ScholarGoogle Scholar
  25. 25.J. Kilian: Ei}icient Interactive Arguments, Proceedings of Crypto '95, Springer Verlag LNCS, vol. 963, pp. 311- 324. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. 26.T. Okamoto: Provably Secure and Practical identification Schemes and Corresponding Signature Schemes, Proceedings of Crypto '92, Springer Verlag LNCS, vol. 740, pp. 31-53. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. 27.A. De Santis, G. Di Crescenzo, G. Persiano and M. Yung: On Monotone Formula Closure of SZK, Proceedings of FOCS '94, pp. 454-465. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. 28.C. P. Schnorr: E.O%ient Signature Generation by Smart Cards, Journal of Cryptology, 4 (3): 161-174, 1991.Google ScholarGoogle Scholar
  29. 29.A. Yao: How to generate and exchange secrets, Proceedings of FOCS '86, pp. 162-167. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Linear zero-knowledge—a note on efficient zero-knowledge proofs and arguments

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Conferences
              STOC '97: Proceedings of the twenty-ninth annual ACM symposium on Theory of computing
              May 1997
              752 pages
              ISBN:0897918886
              DOI:10.1145/258533

              Copyright © 1997 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 4 May 1997

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • Article

              Acceptance Rates

              STOC '97 Paper Acceptance Rate75of211submissions,36%Overall Acceptance Rate1,469of4,586submissions,32%

              Upcoming Conference

              STOC '24
              56th Annual ACM Symposium on Theory of Computing (STOC 2024)
              June 24 - 28, 2024
              Vancouver , BC , Canada

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader