Download
cryptographic protocols n.
Skip this Video
Loading SlideShow in 5 Seconds..
Cryptographic Protocols PowerPoint Presentation
Download Presentation
Cryptographic Protocols

Cryptographic Protocols

123 Vues Download Presentation
Télécharger la présentation

Cryptographic Protocols

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. Cryptographic Protocols ■ Entity Authentication ■ Key Agreement ■ Fiat-Shamir Identification Schemes ■ Zero-Knowledge Proof Systems ■Shnorr’s Identification/Signature Scheme ■ Commitment Schemes ■ Secret Sharing ■ Electronic Election

  2. Entity Authentication Problem: Alice wants to prove to Bob that she is Alice and/or vice versa. Private-key based schemes Public-key based schemes Integrated with key agreement Zero-knowledge identification schemes

  3. Key Agreement/Distribution

  4. Identification Schemes based on zero-knowledge interactive proof systems

  5. Zero-Knowledge Proof Systems

  6. Shnorr’s Identification Scheme Another example of zero-knowledge interactive proof system Proof of knowledge of discrete logarithm