Zero Knowledge Protocols and Proof Systems
#1

Zero Knowledge Protocols and Proof Systems

Zero-knowledge protocols allow identification, key exchange and other basic cryptographic operations to be implemented without leaking any secret information during the conversation and with smaller computational requirements than using comparable public key protocols. Thus Zero-knowledge protocols seem very attractive especially in smart card and embedded applications. There is quite a lot written about zero-knowledge protocols in theory, but not so much practical down-to-earth material is available even though zero-knowledge techniques have been used in many applications. Some of the practical aspects of zero-knowledge protocols and related issues are discussed, in the mind-set of minimalistic practical environments. The hardware technology used in these environments is described, and resulting real-world practical problems are related to zero-knowledge protocols. A very lightweight zero knowledge protocol is outlined and its possible uses and cryptographic strengths and weaknesses are analyzed.

ZERO-KNOWLEDGE PROTOCOL BASICS

Zero-knowledge protocols, as their name says, are cryptographic protocols which do not reveal the information or secret itself during the protocol, or to any eavesdropper. They have some very interesting properties, e.g. as the secret itself (e.g. your identity) is not transferred to the verifying party, they cannot try to masquerade as you to any third party.
Although Zero-knowledge protocols look a bit unusual, most usual cryptographic problems can be solved by using them, as well as with public key cryptography. For some applications, like key exchange (for later normal cheap and fast symmetric encryption on the communications link) or proving mutual identities, zero-knowledge protocols can in many occasions be a very good and suitable solution.

2.1 THE PARTIES IN A ZERO-KNOWLEDGE PROTOCOL

The following people appear in zero-knowledge protocols:

Peggy the Prover
Peggy has some information that she wants to prove to Victor, but she doesn't want to tell the secret itself to Victor.

Victor the Verifier
Victor asks Peggy a series of questions, trying to find out if Peggy really knows the secret or not. Victor does not learn anything of the secret itself, even if he would cheat or not adhere to the protocol.

Eve the Eavesdropper
Eve is listening to the conversation between Peggy and Victor. A good zero-knowledge protocol also makes sure that any third-party will not learn a thing about the secret, and will not even be able to replay it for anyone else later to convince them.
Reply
#2
dear sir

can you give full report of zero knowledge protocol and proof system?
Reply
#3
Hi,
visit this thread. It has an abstract and also a report pdf:
http://studentbank.in/report-zero-knowledge-proofs
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: hydro proof systems llc, zero knowledge protocols seminar ppt, proof shift forier transform, scricd com zero knowledge protocol and proof system full report, damp proof course as seminar, hlv schools victor, 19 3 15 lotterysambad eve,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Human Robot Interaction in Multi-Agent Systems pdf computer topic 0 1,203 25-03-2014, 09:43 PM
Last Post: computer topic
  KNOWLEDGE MANAGEMENT seminar class 3 2,545 10-11-2013, 05:03 AM
Last Post: cymncrigery
  Network security and protocols project topics 1 2,231 24-01-2013, 12:41 PM
Last Post: seminar details
  Evolution of Embedded Systems(Downlaod Seminar Report) Computer Science Clay 2 3,277 14-12-2012, 02:09 PM
Last Post: seminar details
  A survey of usage of Data Mining and Data Warehousing in Academic Institution and Lib seminar class 1 2,119 29-11-2012, 12:56 PM
Last Post: seminar details
  Integration Of Data mining And Data warehousing Systems computer science topics 1 3,255 29-11-2012, 12:56 PM
Last Post: seminar details
  A SURVEY OF QoS ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS project report helper 1 1,985 07-11-2012, 12:42 PM
Last Post: seminar details
  routing Protocols presentation project topics 1 3,825 07-11-2012, 12:42 PM
Last Post: seminar details
  Routing Protocols in Mobile Adhoc Networks iitbuji 2 3,633 07-11-2012, 12:41 PM
Last Post: seminar details
  Real Time Systems with Linux/RTAI computer science crazy 1 2,922 01-11-2012, 02:25 PM
Last Post: seminar details

Forum Jump: