Score:0

What are the main attacks that can be done against a ZK Σ-protocol like Schnorr's identification scheme?

in flag

I heard about the "Chess Grandmaster Problem", Eavesdropping attacks and Man-in-the-middle.
Can they be applied in any way to a ZK protocol?
I'm not looking for long examples, just what are the main attacks and briefly how they work will do.
Thank you so much!

kelalaka avatar
in flag
[Chess Grandmaster Problem and "Valid" Attacks on Zero-Knowledge Proofs of Identity](https://crypto.stackexchange.com/q/19681/18298)
in flag
That question isn't the same as this, even tho the title can make you think it is. In the one you linked, the guy asks clarification for a specific case of a specific attack in detail, in my question i'm asking what are all the different possible attacks against a ZK protocol in general, plus a little explanation. I said "I heard" because I have no idea what are the possible attacks, hence I can't provide links, otherwise I wouldn't have asked in the first place.
mangohost

Post an answer

Most people don’t grasp that asking a lot of questions unlocks learning and improves interpersonal bonding. In Alison’s studies, for example, though people could accurately recall how many questions had been asked in their conversations, they didn’t intuit the link between questions and liking. Across four studies, in which participants were engaged in conversations themselves or read transcripts of others’ conversations, people tended not to realize that question asking would influence—or had influenced—the level of amity between the conversationalists.