Zero Knowledge Protocols and Proof Systems
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
project report tiger
Active In SP

Posts: 1,062
Joined: Feb 2010
06-02-2010, 12:09 AM

Zero Knowledge Protocols and Proof Systems

Zero-knowledge protocols allow identification, key exchange and other basic cryptographic operations to be implemented without leaking any secret information during the conversation and with smaller computational requirements than using comparable public key protocols. Thus Zero-knowledge protocols seem very attractive especially in smart card and embedded applications. There is quite a lot written about zero-knowledge protocols in theory, but not so much practical down-to-earth material is available even though zero-knowledge techniques have been used in many applications. Some of the practical aspects of zero-knowledge protocols and related issues are discussed, in the mind-set of minimalistic practical environments. The hardware technology used in these environments is described, and resulting real-world practical problems are related to zero-knowledge protocols. A very lightweight zero knowledge protocol is outlined and its possible uses and cryptographic strengths and weaknesses are analyzed.


Zero-knowledge protocols, as their name says, are cryptographic protocols which do not reveal the information or secret itself during the protocol, or to any eavesdropper. They have some very interesting properties, e.g. as the secret itself (e.g. your identity) is not transferred to the verifying party, they cannot try to masquerade as you to any third party.
Although Zero-knowledge protocols look a bit unusual, most usual cryptographic problems can be solved by using them, as well as with public key cryptography. For some applications, like key exchange (for later normal cheap and fast symmetric encryption on the communications link) or proving mutual identities, zero-knowledge protocols can in many occasions be a very good and suitable solution.


The following people appear in zero-knowledge protocols:

Peggy the Prover
Peggy has some information that she wants to prove to Victor, but she doesn't want to tell the secret itself to Victor.

Victor the Verifier
Victor asks Peggy a series of questions, trying to find out if Peggy really knows the secret or not. Victor does not learn anything of the secret itself, even if he would cheat or not adhere to the protocol.

Eve the Eavesdropper
Eve is listening to the conversation between Peggy and Victor. A good zero-knowledge protocol also makes sure that any third-party will not learn a thing about the secret, and will not even be able to replay it for anyone else later to convince them.
Active In SP

Posts: 2
Joined: Jun 2010
23-06-2010, 07:49 PM

dear sir

can you give full report of zero knowledge protocol and proof system?
seminars on demand
Active In SP

Posts: 201
Joined: Jun 2010
24-06-2010, 06:48 PM

visit this thread. It has an abstract and also a report pdf:
Use Search at wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Tagged Pages: zero knowledge protocols proof systems ppt, report on zero knowledge protocol and proof systems, zero knowlwdge protocol, zwro knowledge proof report, zero knowledge proof public key, zeroknowledge protocols project material, seminar zero knowledge protocols and proof systems,
Popular Searches: seminar on damp proof course ppt, rsa zero knowledge proofs, disadvantages of damp proof, zero knowledge proofs seminar, accidental proof taarain using rf signal, zero knowledge protocols and proof systems ppt, report zero knowledge proof,

Quick Reply
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Load Rebalancing for Distributed File Systems in Clouds seminar tips 3 1,770 13-04-2015, 05:21 PM
Last Post: shilpavpius
  Wireless Sensor Network Security model using Zero Knowledge Protocol seminar ideas 2 1,413 31-03-2015, 09:08 AM
Last Post: Guest
  basic computer knowledge pdf in marathi jaseelati 0 300 11-02-2015, 01:21 PM
Last Post: jaseelati
  basic computer knowledge pdf in marathi jaseelati 0 243 07-02-2015, 02:23 PM
Last Post: jaseelati
  wireless video service in cdma systems wikipedia jaseelati 0 359 13-01-2015, 04:29 PM
Last Post: jaseelati
  Intelligent Navigation Systems (Download Full Seminar Report) Computer Science Clay 10 6,588 24-03-2014, 02:24 PM
Last Post: seminar project topic
  Embedded Systems : An Overview ( Download Full Seminar Report ) computer science crazy 5 5,272 03-11-2013, 04:04 PM
Last Post: Guest
  4g wireless systems seminar or presentation computer science crazy 39 38,576 03-10-2013, 12:11 PM
Last Post: Guest
  Intrusion detection systems ( Download Full Seminar Report ) computer science crazy 8 15,172 28-09-2013, 03:01 PM
Last Post: Guest
  Protocols and the TCP/IP Suite PPT seminar projects maker 0 364 28-09-2013, 02:42 PM
Last Post: seminar projects maker