Results 1 - 10
of
45,364
Table 2: Zero-knowledge subproofs and their communication complexity.
"... In PAGE 12: ... also developed a ZK watermark detection protocol for ST-DM in [23]. 3 Zero-Knowledge Subproofs The proofs that are employed in the previous zero-knowledge detectors and in the Generalized Gaussian one are shown in Table2 with their respective communication complexity, which has been calculated... ..."
TABLE I MICROBENCHMARK RESULTS FOR ZERO-KNOWLEDGE CLIENT PUZZLES.
Table 4.1: Three private set protocols compared in different security settings. ROM stands for Random Oracle Model , NIZK for Non-Interactive Zero Knowledge , and UC for Universally Composable .
2006
Table 1. Service requests statistics. Requests Predicates Arguments
2007
"... In PAGE 8: ...xamples of what not to ask (e.g. not at 10:00 am or after 3:00 pm and not not at 9:00 am ). Table1 shows the number of requests and the number of included predicates and constant values in these requests. We received a total of 31 requests, which included a total of 548 constraints and a total of 170 constant values.... ..."
Cited by 4
Table 3. Round constant schedule.
Cited by 1
Table 3. Round constant schedule.
Cited by 1
Table 1. Honest veri er Zero-Knowledge-Proof Proof9LOGEQ Theorem 1 (following [Scho93]) The protocol in table 1 is a witness indis- tinguishable proof of knowledge of xi satisfying yi xi (mod p) and z xi (mod p) for some i 2 [1 : n]: Proof 1: 1. Completeness: The following equivalences hold by construction of the proof: i = 1 : s1 x1c1+k1 yc1 1 r1 (mod p); s1 x1c1+k1 zc1t1 (mod p); i 2 : si ki yci i kiy?ci i
TABLE 6 - Constants Module Access Programs Name Type Arguments Description
TABLE 6 - Constants Module Access Programs Name Type Arguments Description
TABLE 6 - Constants Module Access Programs Name Type Arguments Description
Results 1 - 10
of
45,364