Message transmission with reverse firewalls -- secure communication on corrupted machines
From MaRDI portal
Publication:2835593
DOI10.1007/978-3-662-53018-4_13zbMATH Open1378.94039OpenAlexW2401376465MaRDI QIDQ2835593FDOQ2835593
Authors: Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz
Publication date: 30 November 2016
Published in: Advances in Cryptology – CRYPTO 2016 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-53018-4_13
Recommendations
Cites Work
- New directions in cryptography
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Advances in Cryptology - CRYPTO 2003
- Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman
- Title not available (Why is that?)
- Security of symmetric encryption against mass surveillance
- Public keys
- A more cautious approach to security against mass surveillance
- Cliptography: clipping the power of kleptographic attacks
- Rerandomizable RCCA Encryption
- Theory of Cryptography
- Interactive encryption and message authentication
- Resisting randomness subversion: fast deterministic and hedged public-key encryption in the standard model
- Message transmission with reverse firewalls -- secure communication on corrupted machines
- A formal treatment of backdoored pseudorandom generators
- Cryptographic reverse firewalls
- Collusion-Free Protocols in the Mediated Model
- Collusion-free protocols
- Title not available (Why is that?)
- A Non-malleable Group Key Exchange Protocol Robust Against Active Insiders
- Title not available (Why is that?)
Cited In (26)
- Reverse firewalls for adaptively secure MPC without setup
- Cryptographic reverse firewalls
- Message transmission with reverse firewalls -- secure communication on corrupted machines
- Reverse firewalls for oblivious transfer extension and applications to zero-knowledge
- A message franking channel
- Subversion-resilient signatures: definitions, constructions and applications
- Universally composable firewall architectures using trusted hardware
- Immunization against complete subversion without random oracles
- Immunizing backdoored PRGs
- Subversion-resilient authenticated encryption without random oracles
- Steganography-free zero-knowledge
- Receiver-anonymity in rerandomizable RCCA-secure cryptosystems resolved
- Cryptographic reverse firewalls for interactive proof systems
- Subversion-resilient public key encryption with practical watchdogs
- Identity-based encryption for fair anonymity applications: defining, implementing, and applying rerandomizable RCCA-secure IBE
- Cliptography: clipping the power of kleptographic attacks
- Universally composable subversion-resilient cryptography
- UC-secure cryptographic reverse firewall-guarding corrupted systems with the minimum trusted module
- Backdoor-resistant identity-based proxy re-encryption for cloud-assisted wireless body area networks
- Almost tightly-secure re-randomizable and replayable CCA-secure public key encryption
- Cryptographic reverse firewall via malleable smooth projective hash functions
- Reverse firewalls for actively secure MPCs
- Key-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledge
- Access control encryption: enforcing information flow with cryptography
- Subvert KEM to break DEM: practical algorithm-substitution attacks on public-key encryption
- Subversion-resilient signatures without random oracles
This page was built for publication: Message transmission with reverse firewalls -- secure communication on corrupted machines
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2835593)