This preview has intentionally blurred sections. Sign up to view the full version.
View Full DocumentThis preview has intentionally blurred sections. Sign up to view the full version.
View Full DocumentThis preview has intentionally blurred sections. Sign up to view the full version.
View Full DocumentThis preview has intentionally blurred sections. Sign up to view the full version.
View Full Document Spring '10
 SHENGZHONG
 Cryptography, Computer Security, Zeroknowledge proof, Interactive proof system, interactive proof, Computational Zero Knowledge, isomorphic map

Click to edit the document details