Universally composable subversion-resilient cryptography
From MaRDI portal
Publication:2170002
Recommendations
- Subversion-resilient authenticated encryption without random oracles
- Subversion-resilient public key encryption with practical watchdogs
- Subversion-resilient signatures: definitions, constructions and applications
- Universally composable security
- Universally composable two-party and multi-party secure computation
- Universally composable secure computation with corrupted tokens
- scientific article; zbMATH DE number 1842484
- General composition and universal composability in secure multiparty computation
- A simpler variant of universally composable security for standard multiparty computation
Cites work
- scientific article; zbMATH DE number 1842484 (Why is no real title available?)
- A formal treatment of backdoored pseudorandom generators
- Backdoors in pseudorandom number generators: possibility and impossibility results
- Coin flipping by telephone a protocol for solving impossible problems
- Cryptographic reverse firewalls
- Cryptographic reverse firewalls for interactive proof systems
- Efficient and round-optimal oblivious transfer and commitment with adaptive security
- Malleable proof systems and applications
- Message transmission with reverse firewalls -- secure communication on corrupted machines
- Reverse firewalls for actively secure MPCs
- Security of symmetric encryption against mass surveillance
- Subversion-resilient signatures: definitions, constructions and applications
- The dark side of ``black-box cryptography or: should we trust Capstone?
- Universally composable subversion-resilient cryptography
- Universally composable two-party and multi-party secure computation
Cited in
(12)- Reverse firewalls for adaptively secure MPC without setup
- Subversion-resilient signatures: definitions, constructions and applications
- Reverse firewalls for oblivious transfer extension and applications to zero-knowledge
- Agile cryptography: a universally composable approach
- Subversion-resilient authenticated encryption without random oracles
- Security of auditing protocols against subversion attacks
- On subversion-resistant SNARKs
- Subversion-resilient public key encryption with practical watchdogs
- Subversion-resilient enhanced privacy ID
- Universally composable subversion-resilient cryptography
- UC-secure cryptographic reverse firewall-guarding corrupted systems with the minimum trusted module
- Reverse firewalls for actively secure MPCs
This page was built for publication: Universally composable subversion-resilient cryptography
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2170002)