scholar.google.com › citations
Zero-knowledge-based protocols can help verify that software updates for IoT devices are from the authorized manufacturer, ensure that only authorized devices can access a network or user data, and enable secure communication between devices.
Nov 30, 2023
Jul 26, 2017 · Abstract. We present a survey of recent results in the area of zero-knowledge (ZK) protocols based on coding problems and the related Learning ...
People also ask
What is an example of zero-knowledge protocol?
Where can ZKP be used?
What are the applications of zero knowledge proofs in cryptography?
How does ZKP work?
We present a survey of recent results in the area of zero-knowledge (ZK) protocols based on coding problems and the related Learning Parities with Noise ...
The primitives and protocols presented in this work base their security on the difficulty of solving the Rank Syndrome Decoding (RSD) problem. This problem is ...
We present two zero-knowledge protocols for the code-based McEliece public key encryption scheme in the standard model. Consider a prover who encrypted a ...
Nov 25, 2023 · Zero-knowledge protocols can be implemented using well-known public key encryption algorithms. These protocols employ a secret key. The ...
C. Aguilar Melchor, P. Cayrel, P. Gaborit, F. Laguillaumie, A new efficient threshold ring signature scheme based on coding theory. IEEE Trans.
Duration: 3:00:11
Posted: Apr 24, 2024
Posted: Apr 24, 2024
Missing: Based | Show results with:Based
Abstract. This paper defines a new practical construction for a code- based signature scheme. We introduce a new protocol that is designed to follow the ...
May 22, 2024 · ZKP is a cryptographic protocol that allows one party to prove the validity of a statement to another party without revealing any additional ...