Show simple item record

dc.creatorKassaras S., Maglaras L.en
dc.date.accessioned2023-01-31T08:33:02Z
dc.date.available2023-01-31T08:33:02Z
dc.date.issued2020
dc.identifier.issn16130073
dc.identifier.urihttp://hdl.handle.net/11615/74576
dc.description.abstractHow someone can get health insurance without sharing his health information? How you can get a loan without disclosing your credit score? There is a method to certify certain attributes of various data, either this is health metrics or finance information, without revealing the data itself or any other kind of personal data. This method is known as “zero-knowledge proofs”. Zero-Knowledge techniques are mathematical methods used to verify things without sharing or revealing underlying data. Zero-Knowledge protocols have vast applications from simple identity schemes and blockchains to defense research programs and nuclear arms control. In this article we present the basic principles behind ZKP technology, possible applications and the threats and vulnerabilities that it is subject to and we review proposed security solutions. Copyright © 2020 for this paper by its authors.en
dc.language.isoenen
dc.sourceCEUR Workshop Proceedingsen
dc.source.urihttps://www.scopus.com/inward/record.uri?eid=2-s2.0-85101658071&partnerID=40&md5=11a533b686aef7f7fe93bc411f674cd3
dc.subjectApplication programsen
dc.subjectHealthen
dc.subjectHealth insuranceen
dc.subjectBasic principlesen
dc.subjectDefense researchen
dc.subjectHealth informationsen
dc.subjectMathematical methoden
dc.subjectSecurity solutionsen
dc.subjectThreats and vulnerabilitiesen
dc.subjectZero knowledge proofen
dc.subjectZero-knowledge protocolsen
dc.subjectNetwork securityen
dc.subjectCEUR-WSen
dc.titleZKPs: Does this make the cut? Recent advances and success of zero-knowledge security protocolsen
dc.typeconferenceItemen


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record