1 |
Interactive Proofs and Zero-Knowledge Proofs |
2 |
The Notion of Zero-Knowledgeness |
3 |
Zero-Knowledge Proofs (cont.) |
4 |
ZK Proofs and Proofs of Knowledge |
5 |
ZK Proofs for all of NP |
6 |
Power and Efficiency of ZK |
7 |
Variations on ZK |
8 |
Communication Efficiency for NP Arguments |
9 |
A Bounded NIZK Proof System for a Special Language |
10 |
Non-Interactive ZK Proofs for all of NP |
11 |
Generalizing Non-Interactive Zero-Knowledge Proofs |
12 |
Improved Non-Interactive Zero-Knowledge |
13 |
NIZK and the Lunchtime Attack |
14 |
Lunchtime and Chosen Ciphertext Security |
15 |
A Practical CCA-2 PK Cryptosystem |
16 |
Defining ZK Proofs of Knowledge |
17 |
Mutually Independent Commitments |
18 |
Concurrent Zero-Knowledge |
19 |
Concurrent Zero-Knowledge in Polylogarithmic Rounds |
20 |
Secure Multi-Party Computation in the HBC Model |
21 |
Compiling an Honest but Curious Protocol |
22 |
Multi-Party Computation with Perfect Channels |