How to prove all NP statements in zero-knowledge and a methodology of cryptographic protocol design (Extended Abstract)

100Citations
Citations of this article
61Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Under the assumption that encryption functions exist, we show that all languages in NP possess zero-knowledge proofs. That is, it is possible to demonstrate that a CNF formula is satisfiable without revealing any other property of the formula. In particular, without yielding neither a satisfying assignment nor weaker properties such as whether there is a satisfying assignment in which x 1 = TRUE, or whether there is a satisfying assignment in which x 1 = x 3 etc. The above result allows us to prove two fundamental theorems in the field of (two-party and multi-party) cryptographic protocols. These theorems yield automatic and efficient transformations that, given a protocol that is correct with respect to an extremely weak adversary, output a protocol correct in the most adversarial scenario. Thus, these theorems imply powerful methodologies for developing two-party and multi-party cryptographic protocols.

References Powered by Scopus

A Method for Obtaining Digital Signatures and Public-Key Cryptosystems

12409Citations
N/AReaders
Get full text

How to Share a Secret

11148Citations
N/AReaders
Get full text

New Directions in Cryptography

10587Citations
N/AReaders
Get full text

Cited by Powered by Scopus

Dynamic accumulators and application to efficient revocation of anonymous credentials

655Citations
N/AReaders
Get full text

Lossy trapdoor functions and their applications

396Citations
N/AReaders
Get full text

How to share a secret with cheaters

331Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Goldreich, O., Micali, S., & Wigderson, A. (1987). How to prove all NP statements in zero-knowledge and a methodology of cryptographic protocol design (Extended Abstract). In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 263 LNCS, pp. 171–185). Springer Verlag. https://doi.org/10.1007/3-540-47721-7_11

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 34

69%

Professor / Associate Prof. 7

14%

Researcher 5

10%

Lecturer / Post doc 3

6%

Readers' Discipline

Tooltip

Computer Science 39

80%

Mathematics 4

8%

Physics and Astronomy 3

6%

Engineering 3

6%

Save time finding and organizing research with Mendeley

Sign up for free