Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Zero Knowledge Protocols and Proof Systems
Post: #1

Zero Knowledge Protocols and Proof Systems

Zero-knowledge protocols allow identification, key exchange and other basic cryptographic operations to be implemented without leaking any secret information during the conversation and with smaller computational requirements than using comparable public key protocols. Thus Zero-knowledge protocols seem very attractive especially in smart card and embedded applications. There is quite a lot written about zero-knowledge protocols in theory, but not so much practical down-to-earth material is available even though zero-knowledge techniques have been used in many applications. Some of the practical aspects of zero-knowledge protocols and related issues are discussed, in the mind-set of minimalistic practical environments. The hardware technology used in these environments is described, and resulting real-world practical problems are related to zero-knowledge protocols. A very lightweight zero knowledge protocol is outlined and its possible uses and cryptographic strengths and weaknesses are analyzed.


Zero-knowledge protocols, as their name says, are cryptographic protocols which do not reveal the information or secret itself during the protocol, or to any eavesdropper. They have some very interesting properties, e.g. as the secret itself (e.g. your identity) is not transferred to the verifying party, they cannot try to masquerade as you to any third party.
Although Zero-knowledge protocols look a bit unusual, most usual cryptographic problems can be solved by using them, as well as with public key cryptography. For some applications, like key exchange (for later normal cheap and fast symmetric encryption on the communications link) or proving mutual identities, zero-knowledge protocols can in many occasions be a very good and suitable solution.


The following people appear in zero-knowledge protocols:

Peggy the Prover
Peggy has some information that she wants to prove to Victor, but she doesn't want to tell the secret itself to Victor.

Victor the Verifier
Victor asks Peggy a series of questions, trying to find out if Peggy really knows the secret or not. Victor does not learn anything of the secret itself, even if he would cheat or not adhere to the protocol.

Eve the Eavesdropper
Eve is listening to the conversation between Peggy and Victor. A good zero-knowledge protocol also makes sure that any third-party will not learn a thing about the secret, and will not even be able to replay it for anyone else later to convince them.
Post: #2
dear sir

can you give full report of zero knowledge protocol and proof system?
Post: #3
visit this thread. It has an abstract and also a report pdf:

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: hydro proof systems llc, zero knowledge proofs algorithms, scricd com zero knowledge protocol and proof system full report, zero knowledge proofs protocols, vhdl zero padding, singam victor, zero knowledge protocols and proof systems,

Quick Reply
Type your reply to this message here.

Image Verification
Image Verification
(case insensitive)
Please enter the text within the image on the left in to the text box below. This process is used to prevent automated posts.

Possibly Related Threads...
Thread: Author Replies: Views: Last Post
  Human Robot Interaction in Multi-Agent Systems pdf computer topic 0 485 25-03-2014 09:43 PM
Last Post: computer topic
  KNOWLEDGE MANAGEMENT seminar class 3 1,643 10-11-2013 05:03 AM
Last Post: cymncrigery
  Network security and protocols project topics 1 1,356 24-01-2013 12:41 PM
Last Post: seminar details
  Evolution of Embedded Systems(Downlaod Seminar Report) Computer Science Clay 2 2,297 14-12-2012 02:09 PM
Last Post: seminar details
  Integration Of Data mining And Data warehousing Systems computer science topics 1 2,487 29-11-2012 12:56 PM
Last Post: seminar details
  A SURVEY OF QoS ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS project report helper 1 1,458 07-11-2012 12:42 PM
Last Post: seminar details
  routing Protocols presentation project topics 1 3,308 07-11-2012 12:42 PM
Last Post: seminar details
  Routing Protocols in Mobile Adhoc Networks iitbuji 2 2,860 07-11-2012 12:41 PM
Last Post: seminar details
  Real Time Systems with Linux/RTAI computer science crazy 1 2,178 01-11-2012 02:25 PM
Last Post: seminar details
  RTOS - Real Time Operating Systems full report project report tiger 6 10,268 22-10-2012 01:54 PM
Last Post: seminar details