Please note: In order to keep Hive up to date and provide users with the best features, we are no longer able to fully support Internet Explorer. The site is still available to you, however some sections of the site may appear broken. We would encourage you to move to a more modern browser like Firefox, Edge or Chrome in order to experience the site fully.

Concurrent Zero-Knowledge : With Additional Background by Oded Goldreich, Hardback Book

Concurrent Zero-Knowledge : With Additional Background by Oded Goldreich Hardback

Part of the Information Security and Cryptography series

Hardback

Description

Zero-knowledge proofs are fascinating and extremely useful constructs.

Their fascinating nature is due to their seemingly contradictory de?nition; ze- knowledge proofs are convincing and yet yield nothing beyond the validity of the assertion being proved.

Their applicability in the domain of cryptography is vast; they are typically used to force malicious parties to behave according to a predetermined protocol.

In addition to their direct applicability in cr- tography, zero-knowledge proofs serve as a good benchmark for the study of variousproblemsregardingcryptographicprotocols(e.g.,“securecomposition of protocols”).

A fundamental question regarding zero-knowledge protocols refers to the preservation of security (i.e., of the zero-knowledge feature) when many - stances are executed concurrently, and in particular under a purely as- chronous model.

The practical importance of this question, in the days of extensive Internet communication, seems clear.

It turned out that this qu- tion is also very interesting from a theoretical point of view.

In particular, this question served as a benchmark for the study of the security of concurrent executions of protocols and led to the development of techniques for coping with the problems that arise in that setting.

Information

Other Formats

Save 18%

£99.99

£81.69

Item not Available
 
Free Home Delivery

on all orders

 
Pick up orders

from local bookshops

Information

Also in the Information Security and Cryptography series  |  View all