dc.creator | Kassaras S., Maglaras L. | en |
dc.date.accessioned | 2023-01-31T08:33:02Z | |
dc.date.available | 2023-01-31T08:33:02Z | |
dc.date.issued | 2020 | |
dc.identifier.issn | 16130073 | |
dc.identifier.uri | http://hdl.handle.net/11615/74576 | |
dc.description.abstract | How someone can get health insurance without sharing his health information? How you can get a loan without disclosing your credit score? There is a method to certify certain attributes of various data, either this is health metrics or finance information, without revealing the data itself or any other kind of personal data. This method is known as “zero-knowledge proofs”. Zero-Knowledge techniques are mathematical methods used to verify things without sharing or revealing underlying data. Zero-Knowledge protocols have vast applications from simple identity schemes and blockchains to defense research programs and nuclear arms control. In this article we present the basic principles behind ZKP technology, possible applications and the threats and vulnerabilities that it is subject to and we review proposed security solutions. Copyright © 2020 for this paper by its authors. | en |
dc.language.iso | en | en |
dc.source | CEUR Workshop Proceedings | en |
dc.source.uri | https://www.scopus.com/inward/record.uri?eid=2-s2.0-85101658071&partnerID=40&md5=11a533b686aef7f7fe93bc411f674cd3 | |
dc.subject | Application programs | en |
dc.subject | Health | en |
dc.subject | Health insurance | en |
dc.subject | Basic principles | en |
dc.subject | Defense research | en |
dc.subject | Health informations | en |
dc.subject | Mathematical method | en |
dc.subject | Security solutions | en |
dc.subject | Threats and vulnerabilities | en |
dc.subject | Zero knowledge proof | en |
dc.subject | Zero-knowledge protocols | en |
dc.subject | Network security | en |
dc.subject | CEUR-WS | en |
dc.title | ZKPs: Does this make the cut? Recent advances and success of zero-knowledge security protocols | en |
dc.type | conferenceItem | en |