Table 1.
Description of notations.
Fig 1.
The designated-verifier scheme architecture.
Fig 2.
Designated-verifier non-interactive zero-knowledge based on RLWE key exchange.
Fig 3.
The publicly-verifiable scheme architecture.
Fig 4.
Publicly-verifiable non-interactive zero-knowledge based on key exchange.
Table 2.
Comparison the efficiency of related zero-knowledge proof schemes.
Fig 5.
Impact of the secret value size on proof size.
Table 3.
Approximate comparison.