[Cryptography] ZK meeting scheduling protocol?

Benjamin Kreuter brk7bx at virginia.edu
Mon Jan 16 08:27:12 EST 2017


On Mon, 2017-01-16 at 10:19 +0100, yorick17 at outlook.com wrote:

> ZK is pretty much only related to public key identification, whereas
> you want to conceal the identity of the key.

This is not true.  ZK is used as a building block for designing secure
computation protocols as well.

-- Ben
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 847 bytes
Desc: This is a digitally signed message part
URL: <http://www.metzdowd.com/pipermail/cryptography/attachments/20170116/6de03d63/attachment.sig>


More information about the cryptography mailing list