Polynomial runtime and composability
From MaRDI portal
Publication:2392095
Recommendations
Cites work
- Analyzing security protocols using time-bounded task-PIOAs
- Black-box concurrent zero-knowledge requires \(\tilde{\omega}(\log n)\) rounds
- Coercion-resistant electronic elections
- Composition of secure multi-party protocols. A comprehensive study.
- Foundations of Cryptography
- Foundations of Cryptography
- GNUC: a new universal composability framework
- How to construct constant-round zero-knowledge proof systems for NP
- On Expected Probabilistic Polynomial-Time Adversaries: A Suggestion for Restricted Definitions and Their Benefits
- The Knowledge Complexity of Interactive Proof Systems
- Theory of Cryptography
- Theory of Cryptography
- Theory of Cryptography
- Time-Bounded Task-PIOAs: A Framework for Analyzing Security Protocols
Cited in
(12)- Universal composition with responsive environments
- The IITM model: a simple and expressive model for universal composability
- scientific article; zbMATH DE number 63120 (Why is no real title available?)
- MoSS: modular security specifications framework
- Ideal key derivation and encryption in simulation-based security
- Run-time type computations in the Warren Abstract machine
- Self-correcting polynomial programs
- scientific article; zbMATH DE number 782052 (Why is no real title available?)
- Adaptive security of multi-party protocols, revisited
- On expected polynomial runtime in cryptography
- GNUC: a new universal composability framework
- Embedding the UC model into the IITM model
This page was built for publication: Polynomial runtime and composability
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2392095)