1 | Interactive Proofs and Zero-Knowledge Proofs |
2 | The Notion of Zero-Knowledgeness |
3 | Zero-Knowledge Proofs (cont.) |
4 | ZK Proofs and Proofs of Knowledge |
5 | ZK Proofs for all of NP |
6 | Power and Efficiency of ZK |
7 | Variations on ZK |
8 | Communication Efficiency for NP Arguments |
9 | A Bounded NIZK Proof System for a Special Language |
10 | Non-Interactive ZK Proofs for all of NP |
11 | Generalizing Non-Interactive Zero-Knowledge Proofs |
12 | Improved Non-Interactive Zero-Knowledge |
13 | NIZK and the Lunchtime Attack |
14 | Lunchtime and Chosen Ciphertext Security |
15 | A Practical CCA-2 PK Cryptosystem |
16 | Defining ZK Proofs of Knowledge |
17 | Mutually Independent Commitments |
18 | Concurrent Zero-Knowledge |
19 | Concurrent Zero-Knowledge in Polylogarithmic Rounds |
20 | Secure Multi-Party Computation in the HBC Model |
21 | Compiling an Honest but Curious Protocol |
22 | Multi-Party Computation with Perfect Channels |