Proofs, Arguments, and Zero-Knowledge

Proofs, Arguments, and Zero-Knowledge
Author :
Publisher :
Total Pages : 0
Release :
ISBN-10 : 1638281254
ISBN-13 : 9781638281252
Rating : 4/5 (54 Downloads)

Book Synopsis Proofs, Arguments, and Zero-Knowledge by : Justin Thaler

Download or read book Proofs, Arguments, and Zero-Knowledge written by Justin Thaler and published by . This book was released on 2022 with total page 0 pages. Available in PDF, EPUB and Kindle. Book excerpt: This monograph is about verifiable computing (VC). VC refers to cryptographic protocols called interactive proofs (IPs) and arguments that enable a prover to provide a guarantee to a verifier that the prover performed a requested computation correctly. This monograph covers different notions of mathematical proofs and their applications in computer science and cryptography. Informally, what we mean by a proof is anything that convinces someone that a statement is true, and a "proof system" is any procedure that decides what is and is not a convincing proof.Introduced in the 1980s, IPs and arguments represented a major conceptual expansion of what constitutes a "proof" that a statement is true. Traditionally, a proof is a static object that can be easily checked step-by-step for correctness. In contrast, IPs allow for interaction between prover and verifier, as well as a tiny but nonzero probability that an invalid proof passes verification. Arguments (but not IPs) even permit there to be "proofs" of false statements, so long as those "proofs" require exorbitant computational power to find. To an extent, these notions mimic in-person interactions that mathematicians use to convince each other that a claim is true, without going through the painstaking process of writing out and checking a traditional static proof.Celebrated theoretical results from the 1980s and 1990s, such as IP = PSPACE and MIP = NEXP showed that, in principle, surprisingly complicated statements can be verified efficiently. What is more, any argument can in principle be transformed into one that is zero-knowledge, which means that proofs reveal no information other than their own validity. Zero-knowledge arguments have a myriad of applications in cryptography.Within the last decade, general-purpose zero-knowledge arguments have made the jump from theory to practice. This has opened new doors in the design of cryptographic systems, and generated additional insights into the power of IPs and arguments (zero-knowledge or otherwise). There are now no fewer than five promising approaches to designing efficient, general-purpose zero-knowledge arguments. This monograph covers these approaches in a unified manner, emphasizing commonalities between them.


Proofs, Arguments, and Zero-Knowledge Related Books

Proofs, Arguments, and Zero-Knowledge
Language: en
Pages: 0
Authors: Justin Thaler
Categories: COMPUTERS
Type: BOOK - Published: 2022 - Publisher:

DOWNLOAD EBOOK

This monograph is about verifiable computing (VC). VC refers to cryptographic protocols called interactive proofs (IPs) and arguments that enable a prover to pr
Bringing Zero-Knowledge Proofs of Knowledge to Practice
Language: en
Pages: 0
Authors: Stephan Krenn
Categories:
Type: BOOK - Published: 2012 - Publisher:

DOWNLOAD EBOOK

A zero-knowledge proof of knowledge allows one party to convince another party that it knows a secret piece of information without revealing anything about it.
Concurrent Zero-Knowledge
Language: en
Pages: 191
Authors: Alon Rosen
Categories: Computers
Type: BOOK - Published: 2007-05-16 - Publisher: Springer Science & Business Media

DOWNLOAD EBOOK

Protocols that remain zero-knowledge when many instances are executed concurrently are called concurrent zero-knowledge, and this book is devoted to their study
Linear Zero-knowledge
Language: en
Pages: 17
Authors: Ivan Bjerre Damgård
Categories:
Type: BOOK - Published: 1996 - Publisher:

DOWNLOAD EBOOK

Advances in Cryptology -- ASIACRYPT 2012
Language: en
Pages: 791
Authors: Xiaoyun Wang
Categories: Computers
Type: BOOK - Published: 2012-11-19 - Publisher: Springer Science & Business Media

DOWNLOAD EBOOK

This book constitutes the refereed proceedings of the 18th International Conference on the Theory and Application of Cryptology and Information Security, Asiacr