Cryptographic reverse firewalls for interactive proof systems
DOI10.1016/J.TCS.2020.11.043zbMATH Open1502.68053OpenAlexW3111407461WikidataQ114848021 ScholiaQ114848021MaRDI QIDQ2220883FDOQ2220883
Authors: Chaya Ganesh, Bernardo Magri, D. Venturi
Publication date: 25 January 2021
Published in: Theoretical Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.tcs.2020.11.043
Recommendations
- Cryptographic reverse firewalls
- Reverse firewalls for actively secure MPCs
- Message transmission with reverse firewalls -- secure communication on corrupted machines
- Reverse firewalls for adaptively secure MPC without setup
- Cryptographic reverse firewall via malleable smooth projective hash functions
zero-knowledge proofsinteractive proofsalgorithm-substitution attackssubversionwitness indistinguishabilitycryptographic reverse firewalls
Cites Work
- A method for obtaining digital signatures and public-key cryptosystems
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems
- How to construct constant-round zero-knowledge proof systems for NP
- On round-optimal zero knowledge in the bare public-key model
- Title not available (Why is that?)
- Title not available (Why is that?)
- Foundations of Cryptography
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- The prisoners' problem and the subliminal channel
- Efficient secure two-party protocols. Techniques and constructions
- The Knowledge Complexity of Interactive Proof Systems
- On the Non-malleability of the Fiat-Shamir Transform
- Title not available (Why is that?)
- Title not available (Why is that?)
- Strengthening zero-knowledge protocols using signatures
- Title not available (Why is that?)
- Communication-Efficient Non-interactive Proofs of Knowledge with Online Extractors
- On selective-opening attacks against encryption schemes
- NIZKs with an untrusted CRS: security in the face of parameter subversion
- Security of symmetric encryption against mass surveillance
- Public keys
- Non-interactive and reusable non-malleable commitment schemes
- Unifying Zero-Knowledge Proofs of Knowledge
- Quantum proofs of knowledge
- Title not available (Why is that?)
- A more cautious approach to security against mass surveillance
- Improved OR-composition of sigma-protocols
- Online/offline OR composition of sigma protocols
- Cliptography: clipping the power of kleptographic attacks
- Public-key encryption resistant to parameter subversion and its realization from efficiently-embeddable groups
- Message transmission with reverse firewalls -- secure communication on corrupted machines
- Backdoors in pseudorandom number generators: possibility and impossibility results
- A formal treatment of backdoored pseudorandom generators
- Cryptographic reverse firewalls
- Public immunization against complete subversion without random oracles
- Cryptographic reverse firewall via malleable smooth projective hash functions
Cited In (11)
- Reverse firewalls for adaptively secure MPC without setup
- Cryptographic reverse firewalls
- Message transmission with reverse firewalls -- secure communication on corrupted machines
- Reverse firewalls for oblivious transfer extension and applications to zero-knowledge
- Steganography-free zero-knowledge
- Receiver-anonymity in rerandomizable RCCA-secure cryptosystems resolved
- Subversion-resilient enhanced privacy ID
- Universally composable subversion-resilient cryptography
- UC-secure cryptographic reverse firewall-guarding corrupted systems with the minimum trusted module
- Cryptographic reverse firewall via malleable smooth projective hash functions
- Reverse firewalls for actively secure MPCs
This page was built for publication: Cryptographic reverse firewalls for interactive proof systems
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2220883)