Cryptography CS 555 Lecture 20-b. Zero-Knowledge Proof. Review. Identification (entity authentication) password one-time password challenge-response three kinds of challenges symmetric key as well as asymmetric key based. Lecture Outline. Zero knowledge proof protocols.
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
Cryptography CS 555Lecture 20-b
Zero-Knowledge Proof
Fall 2004/Lecture 20
Fall 2004/Lecture 20
Fall 2004/Lecture 20
Fall 2004/Lecture 20
Fall 2004/Lecture 20
Fall 2004/Lecture 20
Fall 2004/Lecture 20
Fall 2004/Lecture 20
Fall 2004/Lecture 20
Fall 2004/Lecture 20
Fall 2004/Lecture 20
Fall 2004/Lecture 20
Fall 2004/Lecture 20
Fall 2004/Lecture 20
Key generation (uses h:{0,1}*Zq)
Public key: (p,q, g,y)
Private key: a
Fall 2004/Lecture 20
Signing message M
r = gk mod p,
e = h(M || r)
s = ae + k mod q
Signature is: (r, s)
To verify that (r,s) is the signature of M
e = h(M || r)
r = gsy-e mod p
Fall 2004/Lecture 20
Fall 2004/Lecture 20