2014
DOI: 10.1007/s00145-014-9191-z
|View full text |Cite
|
Sign up to set email alerts
|

Concurrent Knowledge Extraction in Public-Key Models

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2015
2015
2017
2017

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 65 publications
0
2
0
Order By: Relevance
“…The future study in this field lies in the automatic security analysis of protocol implementations [32] and the security analysis of parallel protocol implementations [33]. It requires improving existing protocol automatic analysis tools or developing new automatic tools for the security analysis of protocol implementations.…”
Section: Discussionmentioning
confidence: 99%
“…The future study in this field lies in the automatic security analysis of protocol implementations [32] and the security analysis of parallel protocol implementations [33]. It requires improving existing protocol automatic analysis tools or developing new automatic tools for the security analysis of protocol implementations.…”
Section: Discussionmentioning
confidence: 99%
“…Deng et al [71,72] solved the simultaneous resettable conjecture problem in zero-knowledge proof. Zhao and Andrew [73] designed concurrent knowledge extraction for public key models. Zero-knowledge proof is the foundation of many kinds of security protocol, and has been widely used to achieve identity authentication, electronic voting protocols and many other application protocols.…”
Section: Cryptographic Protocolsmentioning
confidence: 99%