Round optimal black-box ``commit-and-prove'' (Q1629413): Difference between revisions

From MaRDI portal
Set OpenAlex properties.
ReferenceBot (talk | contribs)
Changed an Item
 
Property / cites work
 
Property / cites work: How to Efficiently Evaluate RAM Programs with Malicious Security / rank
 
Normal rank
Property / cites work
 
Property / cites work: Computationally private randomizing polynomials and their applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Universally composable two-party and multi-party secure computation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Simple, Black-Box Constructions of Adaptively Secure Protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: Multiple NonInteractive Zero Knowledge Proofs Under General Assumptions / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Exact Round Complexity of Secure Computation / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to construct constant-round zero-knowledge proof systems for NP / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Composition of Zero-Knowledge Proof Systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: The knowledge complexity of interactive proof-systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Constant round non-malleable protocols using one way functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Black-box non-black-box zero knowledge / rank
 
Normal rank
Property / cites work
 
Property / cites work: Textbook non-malleable commitments / rank
 
Normal rank
Property / cites work
 
Property / cites work: Semi-honest to Malicious Oblivious Transfer—The Black-Box Way / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient secure two-party protocols. Techniques and constructions / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Power of Secure Two-Party Computation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose / rank
 
Normal rank
Property / cites work
 
Property / cites work: Amortizing Garbled Circuits / rank
 
Normal rank
Property / cites work
 
Property / cites work: Black-box constructions for secure computation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Non-interactive Secure Computation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3549593 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Founding Cryptography on Oblivious Transfer – Efficiently / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology – CRYPTO 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries / rank
 
Normal rank
Property / cites work
 
Property / cites work: An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secure two-party computation via cut-and-choose oblivious transfer / rank
 
Normal rank
Property / cites work
 
Property / cites work: LEGO for Two-Party Secure Computation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Round-Optimal Black-Box Two-Party Computation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Resettably Sound Zero-Knowledge Arguments from OWFs - The (Semi) Black-Box Way / rank
 
Normal rank
Property / cites work
 
Property / cites work: Black-Box Constructions of Two-Party Protocols from One-Way Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Must You Know the Code of f to Securely Compute f? / rank
 
Normal rank
Property / cites work
 
Property / cites work: Two-Output Secure Computation with Malicious Adversaries / rank
 
Normal rank
Property / cites work
 
Property / cites work: Revisiting the Efficiency of Malicious Two-Party Computation / rank
 
Normal rank

Latest revision as of 15:17, 17 July 2024

scientific article
Language Label Description Also known as
English
Round optimal black-box ``commit-and-prove''
scientific article

    Statements

    Round optimal black-box ``commit-and-prove'' (English)
    0 references
    0 references
    0 references
    0 references
    11 December 2018
    0 references
    0 references
    0 references

    Identifiers