New notions of security

From MaRDI portal
Revision as of 03:52, 5 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:3580997

DOI10.1145/1007352.1007394zbMath1192.94124OpenAlexW2085140050MaRDI QIDQ3580997

Manoj Prabhakaran, Amit Sahai

Publication date: 15 August 2010

Published in: Proceedings of the thirty-sixth annual ACM symposium on Theory of computing (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1145/1007352.1007394




Related Items (29)

One-message zero knowledge and non-malleable commitmentsComposable Security in the Tamper-Proof Hardware Model Under Minimal ComplexityComposable Adaptive Secure Protocols Without Setup Under Polytime AssumptionsUnbounded ABE via bilinear entropy expansion, revisitedA unified and composable take on ratchetingConcurrently composable non-interactive secure computationA new approach to efficient non-malleable zero-knowledgeOn concurrent multi-party quantum computationTwo-round maliciously secure computation with super-polynomial simulationAdaptive security of multi-party protocols, revisitedEnvironmentally friendly composable multi-party computation in the plain model from standard (timed) assumptionsImpossibility results for universal composability in public-key models and with fixed inputsRound-efficient black-box construction of composable multi-party computationThe reactive simulatability (RSIM) framework for asynchronous systemsEfficient non-malleable commitment schemesComputing boundary cycle of a pseudo-triangle polygon from its visibility graphConstant Round Adaptively Secure Protocols in the Tamper-Proof Hardware ModelConcurrently Composable Security with Shielded Super-Polynomial SimulatorsOn the Exact Round Complexity of Self-composable Two-Party ComputationWhat security can we achieve within 4 rounds?Efficient non-malleable commitment schemesEfficient hybrid encryption from ID-based encryptionLocal Sequentiality Does Not Help for Concurrent CompositionAdaptive Hardness and Composable Security in the Plain Model from Standard AssumptionsWhat Security Can We Achieve Within 4 Rounds?General composition and universal composability in secure multiparty computationOvercoming impossibility results in composable security using interval-wise guaranteesConditional Reactive SimulatabilitySuccinct non-interactive secure computation




This page was built for publication: New notions of security