Message Transmission with Reverse Firewalls—Secure Communication on Corrupted Machines
From MaRDI portal
Publication:2835593
DOI10.1007/978-3-662-53018-4_13zbMath1378.94039OpenAlexW2401376465MaRDI QIDQ2835593
Ilya Mironov, Yevgeniy Dodis, Noah Stephens-Davidowitz
Publication date: 30 November 2016
Published in: Advances in Cryptology – CRYPTO 2016 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-53018-4_13
Related Items (20)
Receiver-anonymity in rerandomizable RCCA-secure cryptosystems resolved ⋮ Access Control Encryption: Enforcing Information Flow with Cryptography ⋮ UC-secure cryptographic reverse firewall-guarding corrupted systems with the minimum trusted module ⋮ Universally composable subversion-resilient cryptography ⋮ Key-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledge ⋮ Almost tightly-secure re-randomizable and replayable CCA-secure public key encryption ⋮ Cliptography: Clipping the Power of Kleptographic Attacks ⋮ Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions ⋮ Reverse firewalls for oblivious transfer extension and applications to zero-knowledge ⋮ Reverse firewalls for adaptively secure MPC without setup ⋮ Identity-based encryption for fair anonymity applications: defining, implementing, and applying rerandomizable RCCA-secure IBE ⋮ Steganography-free zero-knowledge ⋮ Backdoor-resistant identity-based proxy re-encryption for cloud-assisted wireless body area networks ⋮ Subvert KEM to break DEM: practical algorithm-substitution attacks on public-key encryption ⋮ Cryptographic reverse firewalls for interactive proof systems ⋮ Immunization against complete subversion without random oracles ⋮ Subversion-resilient signatures: definitions, constructions and applications ⋮ Subversion-resilient public key encryption with practical watchdogs ⋮ Message Transmission with Reverse Firewalls—Secure Communication on Corrupted Machines ⋮ Reverse firewalls for actively secure MPCs
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Message Transmission with Reverse Firewalls—Secure Communication on Corrupted Machines
- Security of Symmetric Encryption against Mass Surveillance
- Public Keys
- Interactive Encryption and Message Authentication
- A More Cautious Approach to Security Against Mass Surveillance
- A Formal Treatment of Backdoored Pseudorandom Generators
- Resisting Randomness Subversion: Fast Deterministic and Hedged Public-Key Encryption in the Standard Model
- Cryptographic Reverse Firewalls
- Cliptography: Clipping the Power of Kleptographic Attacks
- A Non-malleable Group Key Exchange Protocol Robust Against Active Insiders
- Collusion-free protocols
- Collusion-Free Protocols in the Mediated Model
- Rerandomizable RCCA Encryption
- New directions in cryptography
- Advances in Cryptology - CRYPTO 2003
- Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman
- Theory of Cryptography
This page was built for publication: Message Transmission with Reverse Firewalls—Secure Communication on Corrupted Machines