Message transmission with reverse firewalls -- secure communication on corrupted machines
From MaRDI portal
Publication:2835593
Recommendations
Cites work
- scientific article; zbMATH DE number 2127879 (Why is no real title available?)
- scientific article; zbMATH DE number 4211487 (Why is no real title available?)
- scientific article; zbMATH DE number 176545 (Why is no real title available?)
- scientific article; zbMATH DE number 177018 (Why is no real title available?)
- scientific article; zbMATH DE number 1302836 (Why is no real title available?)
- scientific article; zbMATH DE number 1303118 (Why is no real title available?)
- A Non-malleable Group Key Exchange Protocol Robust Against Active Insiders
- A formal treatment of backdoored pseudorandom generators
- A more cautious approach to security against mass surveillance
- Advances in Cryptology - CRYPTO 2003
- Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman
- Cliptography: clipping the power of kleptographic attacks
- Collusion-Free Protocols in the Mediated Model
- Collusion-free protocols
- Cryptographic reverse firewalls
- Interactive encryption and message authentication
- Message transmission with reverse firewalls -- secure communication on corrupted machines
- New directions in cryptography
- Public keys
- Rerandomizable RCCA Encryption
- Resisting randomness subversion: fast deterministic and hedged public-key encryption in the standard model
- Security of symmetric encryption against mass surveillance
- Theory of Cryptography
Cited in
(26)- Reverse firewalls for adaptively secure MPC without setup
- Receiver-anonymity in rerandomizable RCCA-secure cryptosystems resolved
- Subvert KEM to break DEM: practical algorithm-substitution attacks on public-key encryption
- Universally composable firewall architectures using trusted hardware
- Key-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledge
- A message franking channel
- Cryptographic reverse firewalls
- Access control encryption: enforcing information flow with cryptography
- Cliptography: clipping the power of kleptographic attacks
- Subversion-resilient signatures: definitions, constructions and applications
- Subversion-resilient signatures without random oracles
- Immunizing backdoored PRGs
- Message transmission with reverse firewalls -- secure communication on corrupted machines
- Almost tightly-secure re-randomizable and replayable CCA-secure public key encryption
- Reverse firewalls for actively secure MPCs
- Universally composable subversion-resilient cryptography
- Immunization against complete subversion without random oracles
- UC-secure cryptographic reverse firewall-guarding corrupted systems with the minimum trusted module
- Subversion-resilient public key encryption with practical watchdogs
- Cryptographic reverse firewall via malleable smooth projective hash functions
- Reverse firewalls for oblivious transfer extension and applications to zero-knowledge
- Cryptographic reverse firewalls for interactive proof systems
- Steganography-free zero-knowledge
- Identity-based encryption for fair anonymity applications: defining, implementing, and applying rerandomizable RCCA-secure IBE
- Subversion-resilient authenticated encryption without random oracles
- Backdoor-resistant identity-based proxy re-encryption for cloud-assisted wireless body area networks
This page was built for publication: Message transmission with reverse firewalls -- secure communication on corrupted machines
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2835593)