「Cryptography-MIT6875」: Lecture 13
Topics Covered:
- Zero knowledge, definitions and example
- ZK Proof for QR Language.
- honest-verifier ZK
- malicious-verifier ZK
Topics Covered:
Topics Covered:
Construction of CRHF from Discrete Log
Digital Signatures only from OWF
Direct Constructions:Trapdoor Permutation and the Hash-and-Sign Paradigm.
Random Oracles.
Today’s topic is Many-time Digital Signatures.
Topics Covered:
Today’s topic is Digital Signatures.
Topics Covered:
Topics Covered:
Topics Covered:
It is indeed possible for $F(x)$ to leak a lot of information about $x$ even if $F$ is one-way.
The hardcore predicate $B(x)$ represent the specific piece of information about $x$ which is hard to compute given $F(x)$.
Topics Covered:
Topics covered:
Topics covered:
Note: The second half of Lecture 5, Number Theory, is contained in Lecture 6.
Topics: