Abstract
Under the assumption that encryption functions exist, we show that all languages in NP possess zero-knowledge proofs. That is, it is possible to demonstrate that a CNF formula is satisfiable without revealing any other property of the formula. In particular, without yielding neither a satisfying assignment nor weaker properties such as whether there is a satisfying assignment in which x 1 = TRUE, or whether there is a satisfying assignment in which x 1 = x 3 etc. The above result allows us to prove two fundamental theorems in the field of (two-party and multi-party) cryptographic protocols. These theorems yield automatic and efficient transformations that, given a protocol that is correct with respect to an extremely weak adversary, output a protocol correct in the most adversarial scenario. Thus, these theorems imply powerful methodologies for developing two-party and multi-party cryptographic protocols.
| Original language | English |
|---|---|
| Title of host publication | Advances in Cryptology — CRYPTO 1986 - Proceedings |
| Editors | Andrew M. Odlyzko |
| Publisher | Springer Verlag |
| Pages | 171-185 |
| Number of pages | 15 |
| ISBN (Print) | 9783540180470 |
| DOIs | |
| State | Published - 1987 |
| Event | Annual International Cryptology Conference, CRYPTO 1986 - Santa Barbara, United States Duration: 11 Aug 1986 → 15 Aug 1986 |
Publication series
| Name | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
|---|---|
| Volume | 263 LNCS |
| ISSN (Print) | 0302-9743 |
| ISSN (Electronic) | 1611-3349 |
Conference
| Conference | Annual International Cryptology Conference, CRYPTO 1986 |
|---|---|
| Country/Territory | United States |
| City | Santa Barbara |
| Period | 11/08/86 → 15/08/86 |
Bibliographical note
Publisher Copyright:© 1987, Springer-Verlag Berlin Heidelberg.