Secure computation against adaptive auxiliary information
From MaRDI portal
Publication:2845680
Recommendations
Cited in
(14)- Enabling cloud storage auditing with key-exposure resilience under continual key-leakage
- Correction to: ``Unconditionally secure computation against low-complexity leakage
- Multiparty computation secure against continual memory leakage
- Secure computation from leaky correlated randomness
- Constant-round leakage-resilient zero-knowledge from collision resistance
- Impossibility of black-box simulation against leakage attacks
- Protecting distributed primitives against leakage: equivocal secret sharing and more
- Leakage-resilient coin tossing
- On-line/off-line leakage resilient secure computation protocols
- Weak Zero-Knowledge beyond the Black-Box Barrier
- Memory leakage-resilient secret sharing schemes
- Equivocating Yao: constant-round adaptively secure multiparty computation in the plain model
- Unconditionally secure computation against low-complexity leakage
- On Invertible Sampling and Adaptive Security
This page was built for publication: Secure computation against adaptive auxiliary information
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2845680)