[Cryptography] ZK meeting scheduling protocol?
Benjamin Kreuter
brk7bx at virginia.edu
Mon Jan 16 08:27:12 EST 2017
On Mon, 2017-01-16 at 10:19 +0100, yorick17 at outlook.com wrote:
> ZK is pretty much only related to public key identification, whereas
> you want to conceal the identity of the key.
This is not true. ZK is used as a building block for designing secure
computation protocols as well.
-- Ben
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 847 bytes
Desc: This is a digitally signed message part
URL: <http://www.metzdowd.com/pipermail/cryptography/attachments/20170116/6de03d63/attachment.sig>
More information about the cryptography
mailing list