Abstract
Under the assumption that encryption functions exist, we show that all languages in NP possess zero-knowledge proofs. That is, it is possible to demonstrate that a CNF formula is satisfiable without revealing any other property of the formula. In particular, without yielding neither a satisfying assignment nor weaker properties such as whether there is a satisfying assignment in which x 1 = TRUE, or whether there is a satisfying assignment in which x 1 = x 3 etc. The above result allows us to prove two fundamental theorems in the field of (two-party and multi-party) cryptographic protocols. These theorems yield automatic and efficient transformations that, given a protocol that is correct with respect to an extremely weak adversary, output a protocol correct in the most adversarial scenario. Thus, these theorems imply powerful methodologies for developing two-party and multi-party cryptographic protocols.
Original language | English |
---|---|
Title of host publication | Advances in Cryptology — CRYPTO 1986 - Proceedings |
Editors | Andrew M. Odlyzko |
Publisher | Springer Verlag |
Pages | 171-185 |
Number of pages | 15 |
ISBN (Print) | 9783540180470 |
DOIs | |
State | Published - 1987 |
Event | Annual International Cryptology Conference, CRYPTO 1986 - Santa Barbara, United States Duration: 11 Aug 1986 → 15 Aug 1986 |
Publication series
Name | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
---|---|
Volume | 263 LNCS |
ISSN (Print) | 0302-9743 |
ISSN (Electronic) | 1611-3349 |
Conference
Conference | Annual International Cryptology Conference, CRYPTO 1986 |
---|---|
Country/Territory | United States |
City | Santa Barbara |
Period | 11/08/86 → 15/08/86 |
Bibliographical note
Publisher Copyright:© 1987, Springer-Verlag Berlin Heidelberg.