[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.5555/36664.36677guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Demonstrating that a public predicate can be satisfied without revealing any information about how

Published: 01 January 1987 Publication History

Abstract

No abstract available.

References

[1]
Blum, M., "Coin flipping by telephone," Proceedings of IEEE Compcon, 1982, pp. 133-137.
[2]
Brassard, G. and Crepeau, C., "Zero-knowledge simulation of boolean circuits," preprint of extended abstract, April 1986.
[3]
Chaum, D., "Showing credentials without identification: signatures transferred between unconditionally unlinkable pseudonyms," Presented at Eurocrypt'85, Linz Austria, April 1985a.
[4]
Chaum, D., "Security without identification: transaction systems to make big brother obsolete," Comm. ACM 28, 10 (October 1985b), pp. 1030-1044.
[5]
Damgård, I., private communication 1986.
[6]
Goldreich, O., Micali, S., and Wigderson, A., "Proofs that yield nothing but the validity of the assertion and the methodology of cryptographic protocol design," preprint, April 1986.
[7]
Goldwasser, S., Micali, S. and Rivest, R.L., "A 'paradoxical' solution to the signature problem," FOCS 84.
[8]
Rabin, M.O., "Digitalized signatures," in Foundations of Secure Computation , Academic Press, NY, 1978.

Cited By

View all

Recommendations

Reviews

Catherine Ann Meadows

An interactive proof authentication protocol is a conversation between a verifier and a prover in which the verifier's goal is to determine whether the prover knows the result of a given computation, and the prover's goal is to convince the verifier that it knows the result without giving the verifier further assistance in determining it. In most cases the prover is assumed to have unlimited computational power, while the verifier's power is limited. The verifier's assurance that its goals have been obtained is probabilistic, while the prover's assurance usually results from a proof that a third party could construct a set of conversations having the same probability distribution as the set of possible conversations between a verifier and an honest prover. Chaum shows in this paper that these assumptions about the relative computational power of the verifier and the prover are not necessary by constructing a protocol in which the assumptions are reversed. In this protocol, the prover convinces the verifier that it knows a particular value S satisfying a predicate P without providing any other information about S. An interesting result of this reversal of capabilities is that Chaum is able to provide a more constructive proof of assurance than those used when the opposite assumptions hold. He provides an information-theoretic proof that the verifier gains no further information about S other than that it satisfies P. He also gives a constructive proof, based on the assumed intractability of factorization, that the odds are overwhelmingly against a prover convincing a verifier that it knows an S that satisfies P, when in fact it does not.

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
Proceedings on Advances in cryptology---CRYPTO '86
January 1987
487 pages
ISBN:0387180478

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 01 January 1987

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 03 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (1991)Public-randomness in public-key cryptography (extended abstract)Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology10.5555/112331.112336(46-62)Online publication date: 1-Feb-1991
  • (1991)How convincing is your protocol?ACM SIGACT News10.1145/122413.12241422:1(5-12)Online publication date: 1-Mar-1991
  • (1991)Practical zero-knowledge proofsJournal of Cryptology10.1007/BF001967274:3(185-206)Online publication date: 1-Jan-1991
  • (1990)Untraceable electronic cashProceedings on Advances in cryptology10.5555/88314.88969(319-327)Online publication date: 1-Feb-1990
  • (1988)Zero knowledge interactive proofs of knowledge (a digest)Proceedings of the 2nd conference on Theoretical aspects of reasoning about knowledge10.5555/1029718.1029720(1-12)Online publication date: 7-Mar-1988
  • (1987)An improved protocol for demonstrating possession of discrete logarithms and some generalizationsProceedings of the 6th annual international conference on Theory and application of cryptographic techniques10.5555/1755056.1755072(127-141)Online publication date: 13-Apr-1987
  • (1987)Zero knowledge proofs of identityProceedings of the nineteenth annual ACM symposium on Theory of computing10.1145/28395.28419(210-217)Online publication date: 1-Jan-1987

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media