Cryptographic reverse firewalls for interactive proof systems
From MaRDI portal
Publication:2220883
DOI10.1016/j.tcs.2020.11.043zbMath1502.68053OpenAlexW3111407461WikidataQ114848021 ScholiaQ114848021MaRDI QIDQ2220883
Bernardo Magri, Chaya Ganesh, Daniele Venturi
Publication date: 25 January 2021
Published in: Theoretical Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.tcs.2020.11.043
interactive proofszero-knowledge proofsalgorithm-substitution attackssubversionwitness indistinguishabilitycryptographic reverse firewalls
Related Items (6)
Receiver-anonymity in rerandomizable RCCA-secure cryptosystems resolved ⋮ Subversion-resilient enhanced privacy ID ⋮ Universally composable subversion-resilient cryptography ⋮ Reverse firewalls for oblivious transfer extension and applications to zero-knowledge ⋮ Reverse firewalls for adaptively secure MPC without setup ⋮ Steganography-free zero-knowledge
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Efficient secure two-party protocols. Techniques and constructions
- Public-key encryption resistant to parameter subversion and its realization from efficiently-embeddable groups
- How to construct constant-round zero-knowledge proof systems for NP
- Public immunization against complete subversion without random oracles
- Strengthening zero-knowledge protocols using signatures
- Improved OR-Composition of Sigma-Protocols
- Message Transmission with Reverse Firewalls—Secure Communication on Corrupted Machines
- Backdoors in Pseudorandom Number Generators: Possibility and Impossibility Results
- Security of Symmetric Encryption against Mass Surveillance
- On the Non-malleability of the Fiat-Shamir Transform
- Quantum Proofs of Knowledge
- On Round-Optimal Zero Knowledge in the Bare Public-Key Model
- Public Keys
- On Selective-Opening Attacks against Encryption Schemes
- A More Cautious Approach to Security Against Mass Surveillance
- A Formal Treatment of Backdoored Pseudorandom Generators
- Cryptographic Reverse Firewalls
- Cliptography: Clipping the Power of Kleptographic Attacks
- NIZKs with an Untrusted CRS: Security in the Face of Parameter Subversion
- Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions
- Non-interactive and reusable non-malleable commitment schemes
- Unifying Zero-Knowledge Proofs of Knowledge
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- The Knowledge Complexity of Interactive Proof Systems
- A method for obtaining digital signatures and public-key cryptosystems
- Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems
- Foundations of Cryptography
- The Prisoners’ Problem and the Subliminal Channel
- Communication-Efficient Non-interactive Proofs of Knowledge with Online Extractors
- Online/Offline OR Composition of Sigma Protocols
This page was built for publication: Cryptographic reverse firewalls for interactive proof systems