期刊文献+

零知识证明协议研究

下载PDF
导出
摘要 在当代密码学中,零知识证明占据着重要的位置.已经成为信息安全领域身份认证的关键技术之一,吸引了许多学者的注意,并得到了一系列的重要研究成果.文章首先阐述了零知识证明的主要思想、零知识证明协议的性质以及零知识证明协议所主要基于的几类数学问题.接着,着重研究了零知识证明在相关问题中的应用.最后,对本文进行了总结,以期能够吸引更多的学者在更广泛的领域对零知识证明协议进行研究.
作者 张引兵 王慧
出处 《赤峰学院学报(自然科学版)》 2014年第7期6-9,共4页 Journal of Chifeng University(Natural Science Edition)
基金 2011年安徽省高校省级自然科学研究项目(KJ2011Z332) 2012年淮北师范大学青年科学研究项目(2012xq54)
  • 相关文献

参考文献12

  • 1Goldwasser S, Micali S, Rackoff C. The knowledge complexity of interactive proof systems, Proceedings of the 17th ACM [C],Symposium on the theory of Computing, 1985:291-304.
  • 2Goldwasser S, Micali S, Rackoff C. The knowledge complexity of interactive proof systems, SIAM |. Comput,18(1989):186-208.
  • 3lonen Gradwohl, Moni Naor, Benny Pinkas,Guy N. Rothblum. Cryptographic and Physical Zero-Knowledge Proof Systems for Solutions of Sudoku Puzzles. Theory Comput Syst (2009) 44:245 - 268.
  • 4李曦,王道顺.多项式函数根的零知识证明协议[J].清华大学学报(自然科学版),2009(7):1015-1018. 被引量:3
  • 5Oded Goldreich, Silvio Micali, Avi Wigderson. Proot that yield nothing but their validity. Journal of the ACM [C], volume 38, issue 3, July 1991:690-728.
  • 6Feige U, Fiat A, Shamir A. Zero-knowledge proofs of identity. Proceedings of the nineteenth annual ACM conference on Theory of computing[C], 1987:210-217.
  • 7Juels A,Kaliski -Jr B S.Pors. Proofs of retrievability for large files. Proceedings of the 2007 ACM Conference on Computer and Communications Security [C], CCS 2007. Alexandria: ACM, 2007:584-597.
  • 8Zhu y, Wang HX, Hu ZX, Ahn GJ, Hu HX. Zero-knowledge proofs of retrievability. Science China-Information Sciences [J].54(8), 2011:1608-1617.
  • 9W Huqing, S Zhixin; Research on Zero- Knowledge Proof Protocol. IJCSI International Journal of Computer Science Issues [J], Vol. 10, Issue 1, No 1, January 2013:194-200.
  • 10Deng Yi, Lin Dongdai. Instance-Dependent Verifiable Random Functions and Their Application to Simultaneous Resettability [C]. EUROCRYPT 2007:148-168.

二级参考文献7

  • 1Goldwasser S, Micali S, Rockoff C. The knowledge complexity of interactive proof system[J].SIAM Journal on Computing, 1989, 18(1):186 - 208.
  • 2Ryan O, Rocco A. Extremal properties of polynomial threshold funetions[J].Journal of Computer and System Sciences, 2008, 30(3): 298-312.
  • 3Manning A. How to be sure of finding a root of a complex polynomial using Newton's method [J].Bulletin of the Brazilian Mathematical Society, 1992, 22(2): 157-177.
  • 4Goldreich O. How to construct constant-round zero-knowledge proof systems for NP [J].Journal of Cryptology, 1996, 9(3) : 167 - 189.
  • 5Vadhan, Salil P. An unconditional study of computational zero knowledge[J]. SIAM Journal on Computing, 2006, 36(4): 1160- 1214.
  • 6Duan S S. Certifieateless undeniable signature scheme [J].Information Sciences, 2008, 178(3) : 742 - 755.
  • 7Menezes A, van Oorsehot P, Vanstone S. Handbook of Applied Cryptography[M]. Florida: CRC Press, 1996.

共引文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部