scientific article; zbMATH DE number 1775426

From MaRDI portal
Revision as of 10:23, 7 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:4542559

zbMath1028.68016MaRDI QIDQ4542559

Cynthia Dwork, Moni Naor, Amit Sahai

Publication date: 27 January 2004


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.





Related Items (48)

Concurrent knowledge extraction in public-key modelsOn the security loss of unique signaturesA note on the Dwork-Naor timed deniable authenticationFull and partial deniability for authentication schemesA novel deniable authentication protocol using generalized ElGamal signature schemeOn Constant-Round Concurrent Zero-Knowledge from a Knowledge AssumptionA new framework for deniable secure key exchangeExplainable argumentsIndistinguishable Proofs of Work or KnowledgeLower bounds and impossibility results for concurrent self compositionConcurrently composable non-interactive secure computationOn constant-round concurrent non-malleable proof systemsOn concurrent multi-party quantum computationIndividual simulationsConstant-Round Concurrent Non-malleable Zero Knowledge in the Bare Public-Key ModelLeakproof secret sharing protocols with applications to group identification schemeSZK proofs for black-box group problemsCryptography and cryptographic protocolsTimed encryption with application to deniable key exchangeQuantum deniable authentication protocolRandom walks and concurrent zero-knowledgeTimed signatures and zero-knowledge proofs -- timestamping in the blockchain eraCryptography Using Captcha PuzzlesNovel \(\Omega\)-protocols for NPUnifying simulatability definitions in cryptographic systems under different timing assumptionsMagic Adversaries Versus Individual Reduction: Science Wins Either WayLower bounds for non-black-box zero knowledgeOn expected probabilistic polynomial-time adversaries: a suggestion for restricted definitions and their benefitsPolling with Physical Envelopes: A Rigorous Analysis of a Human-Centric ProtocolCollusion-Free Protocols in the Mediated ModelCompletely Non-malleable Encryption RevisitedThe Round-Complexity of Black-Box Zero-Knowledge: A Combinatorial CharacterizationA new approach for UC security concurrent deniable authenticationA non-interactive deniable authentication scheme based on designated verifier proofsLocal Sequentiality Does Not Help for Concurrent CompositionRing signatures for deniable AKEM: Gandalf's fellowshipResettable statistical zero-knowledge for NPA simple protocol for deniable authentication based on ElGamal cryptographyResettably Secure ComputationTARDIS: a foundation of time-lock puzzles in UCHybrid commitments and their applications to zero-knowledge proof systemsConcurrently Non-malleable Black-Box Zero Knowledge in the Bare Public-Key ModelDesignated Confirmer Signatures with Unified VerificationPrivate Coins versus Public Coins in Zero-Knowledge Proof SystemsImprovement of Fan et al.'s deniable authentication protocol based on Diffie-Hellman algorithmA new deniable authentication protocol from bilinear pairingsAdaptively secure distributed public-key systems.Generic transformation from broadcast encryption to round-optimal deniable ring authentication







This page was built for publication: