Universally composable subversion-resilient cryptography
From MaRDI portal
Publication:2170002
DOI10.1007/978-3-031-06944-4_10zbMATH Open1496.94032OpenAlexW4285105974MaRDI QIDQ2170002FDOQ2170002
Authors: Suvradip Chakraborty, Bernardo Magri, Jesper Buus Nielsen, D. Venturi
Publication date: 30 August 2022
Full work available at URL: https://doi.org/10.1007/978-3-031-06944-4_10
Recommendations
- Subversion-resilient authenticated encryption without random oracles
- Subversion-resilient public key encryption with practical watchdogs
- Subversion-resilient signatures: definitions, constructions and applications
- Universally composable security
- Universally composable two-party and multi-party secure computation
- Universally composable secure computation with corrupted tokens
- scientific article; zbMATH DE number 1842484
- General composition and universal composability in secure multiparty computation
- A simpler variant of universally composable security for standard multiparty computation
Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Theory of compilers and interpreters (68N20)
Cites Work
- Malleable Proof Systems and Applications
- Universally composable two-party and multi-party secure computation
- Title not available (Why is that?)
- Coin flipping by telephone a protocol for solving impossible problems
- Efficient and round-optimal oblivious transfer and commitment with adaptive security
- Security of Symmetric Encryption against Mass Surveillance
- The Dark Side of “Black-Box” Cryptography or: Should We Trust Capstone?
- Subversion-resilient signatures: definitions, constructions and applications
- Message Transmission with Reverse Firewalls—Secure Communication on Corrupted Machines
- Backdoors in Pseudorandom Number Generators: Possibility and Impossibility Results
- A Formal Treatment of Backdoored Pseudorandom Generators
- Cryptographic Reverse Firewalls
- Universally composable subversion-resilient cryptography
- Reverse firewalls for actively secure MPCs
- Cryptographic reverse firewalls for interactive proof systems
Cited In (6)
- Reverse firewalls for adaptively secure MPC without setup
- Reverse firewalls for oblivious transfer extension and applications to zero-knowledge
- Agile cryptography: a universally composable approach
- Subversion-resilient authenticated encryption without random oracles
- On subversion-resistant SNARKs
- Universally composable subversion-resilient cryptography
This page was built for publication: Universally composable subversion-resilient cryptography
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2170002)