scientific article; zbMATH DE number 1942416

From MaRDI portal
Revision as of 02:15, 7 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:4409113

zbMath1027.68601MaRDI QIDQ4409113

Jesper Buus Nielsen

Publication date: 30 June 2003

Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2442/24420111.htm

Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (70)

A Note on the Instantiability of the Quantum Random OracleImpossibility of simulation secure functional encryption even with random oraclesRevisiting key-alternating Feistel ciphers for shorter keys and multi-user securityAuthenticated key exchange and signatures with tight security in the standard modelReceiver Selective Opening Security from Indistinguishability ObfuscationFiat-Shamir and correlation intractability from strong KDM-secure encryptionRandom oracles and non-uniformityThe wonderful world of global random oraclesA Unified Framework for Non-universal SNARKsA unified and composable take on ratchetingProxy-invisible CCA-secure type-based proxy re-encryption without random oraclesThe random oracle model: a twenty-year retrospectiveBounded Collusion ABE for TMs from IBESelective-Opening Security in the Presence of Randomness FailuresHow to Generate and Use Universal SamplersA Shuffle Argument Secure in the Generic ModelUniversally Composable Cryptographic Role-Based Access ControlEncoding Functions with Constant Online Rate, or How to Compress Garbled Circuit KeysLet attackers program ideal models: modularity and composability for adaptive compromiseA more complete analysis of the signal double ratchet algorithmA random oracle for all of usNew and improved constructions for partially equivocable public key encryptionRotatable zero knowledge sets. Post compromise secure auditable dictionaries with application to key transparencyAstrolabous: a universally composable time-lock encryption schemeAugmented random oraclesTo label, or not to label (in generic groups)A new approach to efficient non-malleable zero-knowledgeCompleteness theorems for adaptively secure broadcastUniversally Composable Simultaneous Broadcast against a Dishonest Majority and ApplicationsEfficient and round-optimal oblivious transfer and commitment with adaptive securityNon-interactive composition of sigma-protocols via Share-then-HashPossibility and impossibility results for receiver selective opening secure PKE in the multi-challenge settingImproved Garbled Circuit: Free XOR Gates and ApplicationsAcyclicity programming for sigma-protocolsThe cost of adaptivity in security games on graphsConstructions Secure Against Receiver Selective Opening and Chosen Ciphertext AttacksJoint state composition theorems for public-key encryption and digital signature functionalities with local computationPossibility and impossibility results for selective decommitmentsFully Anonymous Group Signatures Without Random OraclesModeling Random Oracles Under Unpredictable QueriesNon-adaptive programmability of random oracleEfficient one-sided adaptively secure computationFeasibility and Infeasibility of Adaptively Secure Fully Homomorphic EncryptionOn the Semantic Security of Functional Encryption SchemesOn the Connection between Leakage Tolerance and Adaptive SecurityFine-grained forward-secure signature schemes without random oraclesUniqueness of \(DP\)-Nash subgraphs and \(D\)-sets in weighted graphs of Netflix gamesCompletely Non-malleable Encryption RevisitedSecurity of Digital Signature Schemes in Weakened Random Oracle ModelsA synthetic indifferentiability analysis of some block-cipher-based hash functionsPossibility and Impossibility Results for Encryption and Commitment Secure under Selective OpeningAdaptively secure MPC with sublinear communication complexityTightly-secure authenticated key exchange, revisitedTARDIS: a foundation of time-lock puzzles in UCEfficient adaptively-secure IB-KEMs and VRFs via near-collision resistanceOn selective-opening security of deterministic primitivesOn Adaptively Secure Multiparty Computation with a Short CRSThe Feasibility of Outsourced Database Search in the Plain ModelVirtual Smart Cards: How to Sign with a Password and a ServerA Unified Approach to Idealized Model Separations via Indistinguishability ObfuscationAdaptively Secure Garbled Circuits from One-Way FunctionsTwo-Message, Oblivious Evaluation of Cryptographic FunctionalitiesDesignated Confirmer Signatures with Unified VerificationA Modular Treatment of Cryptographic APIs: The Symmetric-Key CaseLeaky Random Oracle (Extended Abstract)Handling adaptive compromise for practical encryption schemesOvercoming impossibility results in composable security using interval-wise guaranteesFully deniable interactive encryptionHow to Simulate It – A Tutorial on the Simulation Proof TechniqueEquivocating Yao: Constant-Round Adaptively Secure Multiparty Computation in the Plain Model




This page was built for publication: