General composition and universal composability in secure multiparty computation
From MaRDI portal
Publication:1027983
DOI10.1007/S00145-008-9021-2zbMATH Open1184.94243OpenAlexW2157779300MaRDI QIDQ1027983FDOQ1027983
Authors: Yehuda Lindell
Publication date: 30 June 2009
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-008-9021-2
Recommendations
- Universally composable two-party and multi-party secure computation
- Universally Composable Multiparty Computation with Partially Isolated Parties
- A simpler variant of universally composable security for standard multiparty computation
- Adaptively secure, universally composable, multiparty computation in constant rounds
- Secure multiparty computation with general interaction patterns
- Topics in Cryptology – CT-RSA 2006
- Advances in Cryptology - CRYPTO 2003
- Generalizing efficient multiparty computation
- Distributing the setup in universally composable multi-party computation
- Universally Composable Multi-party Computation Using Tamper-Proof Hardware
Cites Work
- Security and composition of multiparty cryptographic protocols
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Black-Box Concurrent Zero-Knowledge Requires (Almost) Logarithmically Many Rounds
- Foundations of Cryptography
- Concurrent zero-knowledge
- Composition of secure multi-party protocols. A comprehensive study.
- On the limitations of universally composable two-party computation without set-up assumptions
- Magic Functions
- Universally composable two-party and multi-party secure computation
- New notions of security: achieving universal composability without trusted setup
- Title not available (Why is that?)
- Title not available (Why is that?)
- Theory of Cryptography
- Secure multi-party computation without agreement
- Bounded-concurrent secure multi-party computation with a dishonest majority
- Bounded-concurrent secure two-party computation without setup assumptions
- Concurrent composition of secure protocols in the timing model
- Cryptography and cryptographic protocols
- Theory of Cryptography
Cited In (28)
- On black-box complexity of universally composable security in the CRS model
- On the Necessity of Rewinding in Secure Multiparty Computation
- Secure composition of cryptographic protocols. (Abstract)
- A Simpler Variant of Universally Composable Security for Standard Multiparty Computation
- Concurrent general composition of secure protocols in the timing model
- Universally composable two-party and multi-party secure computation
- On Black-Box Complexity of Universally Composable Security in the CRS Model
- A Compiler of Two-Party Protocols for Composable and Game-Theoretic Security, and Its Application to Oblivious Transfer
- A Note on the Feasibility of Generalized Universal Composability
- Theory of Cryptography
- Title not available (Why is that?)
- Information Security
- Advances in Cryptology - CRYPTO 2003
- Information-theoretically secure protocols and security under composition
- Universally composable subversion-resilient cryptography
- On expected probabilistic polynomial-time adversaries: a suggestion for restricted definitions and their benefits
- Universally Composable Simultaneous Broadcast
- Information Security
- Theory of Cryptography
- Lower bounds and impossibility results for concurrent self composition
- How to simulate it in Isabelle: towards formal proof for secure multi-party computation
- (Efficient) universally composable oblivious transfer using a minimal number of stateless tokens
- Resource fairness and composability of cryptographic protocols
- Progress in Cryptology - INDOCRYPT 2004
- On the limitations of universally composable two-party computation without set-up assumptions
- Concurrent composition of secure protocols in the timing model
- Local Sequentiality Does Not Help for Concurrent Composition
- Overcoming impossibility results in composable security using interval-wise guarantees
This page was built for publication: General composition and universal composability in secure multiparty computation
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1027983)