Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Computer Science Applications,Software
Reference15 articles.
1. M. Blum, Coin flipping by telephone, Proc. 24th IEEE Campcon, 1982, pp. 133–137.
2. M. Blum and S. Micali, How to generate cryptographically strong sequences of pseudorandom bits, SIAM Journal on Computing, Vol. 13 (1984), pp. 850–864.
3. G. Brassard, D. Chaum, and C. Crépeau, Minimum disclosure proofs of knowledge, Journal of Computer and System Sciences, Vol. 37 (1988). pp. 156–189.
4. D. Chaum, I. Damgård, and J. van de Graaf, Multiparty computations ensuring secrecy of each party's input and correctness of the output, Proc. Crypto '87, p. 462.
5. A. Fiat and A. Shamir, How to prove yourself, Proc. Crypto '86, pp. 641–654.
Cited by
437 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. One-Way Functions and Zero Knowledge;Proceedings of the 56th Annual ACM Symposium on Theory of Computing;2024-06-10
2. Watermarking PRFs and PKE Against Quantum Adversaries;Journal of Cryptology;2024-04-26
3. Fully device independent quantum private query;Advances in Mathematics of Communications;2024
4. Commitment;Encyclopedia of Cryptography, Security and Privacy;2024
5. Resettable Statistical Zero-Knowledge for $$\ensuremath {\textsf{NP}}$$;Lecture Notes in Computer Science;2024