Font Size: a A A

Data mining using clustering algorithms in bioinformatics

Posted on:2004-04-16Degree:M.SType:Thesis
University:State University of New York Institute of TechnologyCandidate:Sharma, RachitaFull Text:PDF
GTID:2468390011960655Subject:Biology
Abstract/Summary:PDF Full Text Request
Zero Knowledge proofs are fascinating and very useful in many cryptographic applications. Their importance is due to their zero knowledge property, i.e. zero knowledge proof allows one person to convince some other person of some fact without having to reveal any knowledge about the proof. Zero knowledge proofs can be used for authentication. Many zero knowledge protocols are being used for secure authentication in networks, in smart cards and in embedded systems.; In this paper I explain what they are and how they are secure in cryptography. I review various Zero Knowledge Protocols and I also explain how we can use zero knowledge proofs for authentication by implementing the Feige-Fiat-Shamir identification protocol.
Keywords/Search Tags:Zero knowledge, Knowledge proofs
PDF Full Text Request
Related items