Be adaptive, avoid overcommitting
From MaRDI portal
Publication:1675723
DOI10.1007/978-3-319-63688-7_5zbMath1407.94123OpenAlexW2724149932MaRDI QIDQ1675723
Chethan Kamath, Daniel Wichs, Ilan Komargodski, Zahra Jafargholi, Karen Klein, Krzysztof Pietrzak
Publication date: 3 November 2017
Full work available at URL: https://doi.org/10.1007/978-3-319-63688-7_5
Related Items (17)
Fast, Compact, and Expressive Attribute-Based Encryption ⋮ Limits on the adaptive security of Yao's garbling ⋮ Cutting-edge cryptography through the lens of secret sharing ⋮ Adaptively secure garbling schemes for parallel computations ⋮ Bounded Collusion ABE for TMs from IBE ⋮ Compact adaptively secure ABE for \(\mathsf{NC}^1\) from \(k\)-Lin ⋮ Asymmetric group message franking: definitions and constructions ⋮ Privately puncturing PRFs from lattices: adaptive security and collusion resistant pseudorandomness ⋮ (Inner-product) functional encryption with updatable ciphertexts ⋮ The power of undirected rewindings for adaptive security ⋮ On treewidth, separators and Yao's garbling ⋮ The cost of adaptivity in security games on graphs ⋮ Fast, compact, and expressive attribute-based encryption ⋮ Compact adaptively secure ABE from \(k\)-Lin: beyond \(\mathsf{NC}^1\) and towards \(\mathsf{NL} \) ⋮ Adaptively secure ABE for DFA from \(k\)-Lin and more ⋮ Compact NIZKs from standard assumptions on bilinear maps ⋮ Security analysis and improvements for the IETF MLS standard for group messaging
This page was built for publication: Be adaptive, avoid overcommitting