scientific article; zbMATH DE number 503243

From MaRDI portal
Revision as of 18:11, 6 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:4279565

zbMath0800.68459MaRDI QIDQ4279565

Leonid A. Levin

Publication date: 20 September 1994


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (51)

Efficient set intersection with simulation-based securityAutomata evaluation and text search protocols with simulation-based securityFast cut-and-choose-based protocols for malicious and covert adversariesToward a game theoretic view of secure computationConcurrent signatures from a variety of keysPractical and provably secure release of a secret and exchange of signaturesOn fully secure MPC with solitary outputSecure two-party computation via cut-and-choose oblivious transferLower bounds and impossibility results for concurrent self compositionConcurrently composable non-interactive secure computationPartial fairness in secure two-party computationFairness versus guaranteed output delivery in secure multiparty computationUniversally composable symbolic security analysisAdaptive security of multi-party protocols, revisitedCommunication-efficient distributed oblivious transfer\(1/p\)-secure multiparty computation without an honest majority and the best of both worldsImpossibility results for universal composability in public-key models and with fixed inputsResource fairness and composability of cryptographic protocolsCryptography and cryptographic protocolsFast large-scale honest-majority MPC for malicious adversariesMust the communication graph of MPC protocols be an expander?The reactive simulatability (RSIM) framework for asynchronous systemsTask-structured probabilistic I/O automataA full proof of the BGW protocol for perfectly secure multiparty computationUnifying simulatability definitions in cryptographic systems under different timing assumptionsSecurity against covert adversaries: Efficient protocols for realistic adversariesAbstractions of non-interference security: probabilistic versus possibilisticEfficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert AdversariesSimplified Universal Composability FrameworkEfficient protocols for set intersection and pattern matching with security against malicious and covert adversariesSecure computation of the median (and other elements of specified ranks)Efficient Fully-Simulatable Oblivious TransferLegally-Enforceable Fairness in Secure Two-Party ComputationAdaptively Secure Two-Party Computation with ErasuresLocal Sequentiality Does Not Help for Concurrent CompositionComputationally secure pattern matching in the presence of malicious adversariesA proof of security of Yao's protocol for two-party computationAccelerating Oblivious Transfer with Batch Multi-exponentiationAdaptive Hardness and Composable Security in the Plain Model from Standard AssumptionsLegally Fair Contract Signing Without KeystonesGeneral composition and universal composability in secure multiparty computationHow to fairly reconstruct a shared secretHow to obtain full privacy in auctionsOn Complete Primitives for FairnessStatistical Security Conditions for Two-Party Secure Function EvaluationQuantum verifiable protocol for secure modulo zero-sum randomnessAn efficient protocol for secure two-party computation in the presence of malicious adversariesLimits of the Cryptographic Realization of Dolev-Yao-Style XORSoundness of Formal Encryption in the Presence of Key-CyclesSecure multiparty protocols and zero-knowledge proof systems tolerating a faulty minorityEquivocating Yao: Constant-Round Adaptively Secure Multiparty Computation in the Plain Model







This page was built for publication: