Universally composable subversion-resilient cryptography
From MaRDI portal
Publication:2170002
DOI10.1007/978-3-031-06944-4_10zbMATH Open1496.94032OpenAlexW4285105974MaRDI QIDQ2170002FDOQ2170002
Authors: Suvradip Chakraborty, Bernardo Magri, Jesper Buus Nielsen, D. Venturi
Publication date: 30 August 2022
Full work available at URL: https://doi.org/10.1007/978-3-031-06944-4_10
Recommendations
- Subversion-resilient authenticated encryption without random oracles
- Subversion-resilient public key encryption with practical watchdogs
- Subversion-resilient signatures: definitions, constructions and applications
- Universally composable security
- Universally composable two-party and multi-party secure computation
- Universally composable secure computation with corrupted tokens
- scientific article; zbMATH DE number 1842484
- General composition and universal composability in secure multiparty computation
- A simpler variant of universally composable security for standard multiparty computation
Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Theory of compilers and interpreters (68N20)
Cites Work
- Malleable proof systems and applications
- Universally composable two-party and multi-party secure computation
- Title not available (Why is that?)
- Coin flipping by telephone a protocol for solving impossible problems
- Efficient and round-optimal oblivious transfer and commitment with adaptive security
- Security of symmetric encryption against mass surveillance
- The dark side of ``black-box cryptography or: should we trust Capstone?
- Subversion-resilient signatures: definitions, constructions and applications
- Message transmission with reverse firewalls -- secure communication on corrupted machines
- Backdoors in pseudorandom number generators: possibility and impossibility results
- A formal treatment of backdoored pseudorandom generators
- Cryptographic reverse firewalls
- Universally composable subversion-resilient cryptography
- Reverse firewalls for actively secure MPCs
- Cryptographic reverse firewalls for interactive proof systems
Cited In (12)
- Reverse firewalls for adaptively secure MPC without setup
- Reverse firewalls for oblivious transfer extension and applications to zero-knowledge
- Subversion-resilient signatures: definitions, constructions and applications
- Agile cryptography: a universally composable approach
- Subversion-resilient authenticated encryption without random oracles
- Security of auditing protocols against subversion attacks
- On subversion-resistant SNARKs
- Subversion-resilient public key encryption with practical watchdogs
- Subversion-resilient enhanced privacy ID
- Universally composable subversion-resilient cryptography
- UC-secure cryptographic reverse firewall-guarding corrupted systems with the minimum trusted module
- Reverse firewalls for actively secure MPCs
This page was built for publication: Universally composable subversion-resilient cryptography
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2170002)