Round-efficient black-box construction of composable multi-party computation
From MaRDI portal
Publication:1715857
DOI10.1007/s00145-018-9276-1zbMath1435.94135OpenAlexW2791558958MaRDI QIDQ1715857
Publication date: 29 January 2019
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-018-9276-1
multi-party computationcomposabilityblack-box constructionangel-based UC securityCCA-secure commitment
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Bit commitment using pseudorandomness
- A black-box construction of non-malleable encryption from semantically secure encryption
- Concurrent zero knowledge, revisited
- On the limitations of universally composable two-party computation without set-up assumptions
- Adaptive Hardness and Composable Security in the Plain Model from Standard Assumptions
- Concurrently Secure Computation in Constant Rounds
- Black-Box Constructions of Composable Protocols without Set-Up
- Black-box constructions for secure computation
- Black-Box Constructions of Protocols for Secure Computation
- Magic Functions
- Universally composable two-party and multi-party secure computation
- New notions of security
- Founding Cryptography on Oblivious Transfer – Efficiently
- Simple, Black-Box Constructions of Adaptively Secure Protocols
- Black-Box Constructions of Two-Party Protocols from One-Way Functions
- A Pseudorandom Generator from any One-way Function
- Nonmalleable Cryptography
- A Unified Framework for UC from Only OT
- Round-Efficient Concurrently Composable Secure Computation via a Robust Extraction Lemma
- Constant round non-malleable protocols using one way functions
- Semi-honest to Malicious Oblivious Transfer—The Black-Box Way
- Black-Box Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One
- Concurrent Non-malleable Commitments from Any One-Way Function
- Constant-Round Black-Box Construction of Composable Multi-Party Computation Protocol
- Theory of Cryptography
- Theory of Cryptography