Zero-knowledge protocols allow identification,
ZERO-KNOWLEDGE PROTOCOL BASICS
Zero-knowledge protocols, as their name says, are cryptographic protocols which do not reveal the information or secret itself during the protocol, or to any eavesdropper. They have some very interesting properties, e.g. as
Although Zero-knowledge protocols look a bit unusual, most usual cryptographic problems can be solved by using them, as well as with public key cryptography. For some applications, like key exchange (for later normal cheap and fast symmetric encryption on the
2.1 THE PARTIES IN A ZERO-KNOWLEDGE PROTOCOL
The following people appear in zero-knowledge protocols:
Peggy the Prover
Peggy has some information that she wants to prove to Victor, but she doesn't want to tell the secret itself to Victor.
Victor the Verifier
Victor asks Peggy a series of questions, trying to find out if Peggy really knows the secret or not. Victor does not learn anything of the secret itself, even if he would cheat or not adhere to the protocol.
Eve the Eavesdropper
Eve is listening to the conversation between Peggy and Victor. A good zero-knowledge protocol also makes sure that any third-party will not learn a thing about the secret, and will not even be able to replay it for anyone else later to convince them.
No comments:
Post a Comment