Parallel coin-tossing and constant-round secure two-party computation

From MaRDI portal
Revision as of 16:06, 31 January 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:1402368

DOI10.1007/S00145-002-0143-7zbMath1027.94011OpenAlexW2089592270MaRDI QIDQ1402368

Yehuda Lindell

Publication date: 27 August 2003

Published in: Journal of Cryptology (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/s00145-002-0143-7




Related Items (26)

Concurrent knowledge extraction in public-key modelsA compressed \(\varSigma \)-protocol theory for latticesCompressing proofs of \(k\)-out-of-\(n\) partial knowledgeTime- and space-efficient arguments from groups of unknown orderAn optimally fair coin tossImproved zero-knowledge argument of encrypted extended permutationA verifiable secret shuffle of homomorphic encryptionsA note on constant-round zero-knowledge proofs of knowledgeSecure two-party computation via cut-and-choose oblivious transferAn optimized inner product argument with more application scenariosCompressed $$\varSigma $$-Protocols for Bilinear Group Arithmetic Circuits and Application to Logarithmic Transparent Threshold SignaturesEfficient unique ring signatures from latticesTowards practical homomorphic time-lock puzzles: applicability and verifiabilityA new interactive hashing theoremEfficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert AdversariesEfficient protocols for set intersection and pattern matching with security against malicious and covert adversariesProtocols for multiparty coin toss with a dishonest majorityA note on universal composable zero-knowledge in the common reference string modelSPARKs: succinct parallelizable arguments of knowledgePost-quantum multi-party computationEfficient range proofs with transparent setup from bounded integer commitmentsAn improvement of multi-exponentiation with encrypted bases argument: smaller and fasterHandling expected polynomial-time strategies in simulation-based security proofsReducing complexity assumptions for statistically-hiding commitmentFinding Collisions in Interactive Protocols---Tight Lower Bounds on the Round and Communication Complexities of Statistically Hiding CommitmentsCompressed \(\varSigma\)-protocol theory and practical application to plug \& play secure algorithmics







This page was built for publication: Parallel coin-tossing and constant-round secure two-party computation