CryptoFly.us | CRYPTOCURRENCY BITCOIN SHIRTS CLOTHING APPAREL HATS

CRYPTO NEWS

What are the main attacks that can be done against a ZK Σ-protocol like Schnorr’s identification scheme?

I heard about the "Chess Grandmaster Problem", Eavesdropping attacks and Man-in-the-middle.
Can they be applied in any way to a ZK protocol?
I’m not looking for long examples, just what are the main attacks and briefly how they work will do.
Thank you so much!

What are the main attacks that can be done against a ZK Σ-protocol like Schnorr’s identification scheme?

Shopping cart
There are no products in the cart!
Continue shopping
0