Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions
From MaRDI portal
Publication:2958150
DOI10.1007/978-3-662-53887-6_31zbMath1404.94052OpenAlexW2550436106MaRDI QIDQ2958150
Willy Susilo, Guomin Yang, Yi Mu, Fuchun Guo, Rongmao Chen, Mingwu Zhang
Publication date: 1 February 2017
Published in: Advances in Cryptology – ASIACRYPT 2016 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-53887-6_31
oblivious transfercryptographic reverse firewalloblivious signature-based envelopemalleable smooth projective hash function
Related Items
Receiver-anonymity in rerandomizable RCCA-secure cryptosystems resolved, UC-secure cryptographic reverse firewall-guarding corrupted systems with the minimum trusted module, Subversion-resilient enhanced privacy ID, Reverse firewalls for oblivious transfer extension and applications to zero-knowledge, Reverse firewalls for adaptively secure MPC without setup, Identity-based encryption for fair anonymity applications: defining, implementing, and applying rerandomizable RCCA-secure IBE, Backdoor-resistant identity-based proxy re-encryption for cloud-assisted wireless body area networks, Subvert KEM to break DEM: practical algorithm-substitution attacks on public-key encryption, Cryptographic reverse firewalls for interactive proof systems, Novel Identity-Based Hash Proof System with Compact Master Public Key from Lattices in the Standard Model, Subversion-resilient public key encryption with practical watchdogs, Public key encryption with equality test via hash proof system, Reverse firewalls for actively secure MPCs
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Smooth projective hashing and two-message oblivious transfer
- KDM-Security via Homomorphic Smooth Projective Hashing
- Message Transmission with Reverse Firewalls—Secure Communication on Corrupted Machines
- New Techniques for SPHFs and Efficient One-Round PAKE Protocols
- Security of Symmetric Encryption against Mass Surveillance
- Round-Optimal Privacy-Preserving Protocols with Smooth Projective Hash Functions
- A Formal Treatment of Backdoored Pseudorandom Generators
- Disjunctions for Hash Proof Systems: New Constructions and Applications
- Resisting Randomness Subversion: Fast Deterministic and Hedged Public-Key Encryption in the Standard Model
- Cryptographic Reverse Firewalls
- Cliptography: Clipping the Power of Kleptographic Attacks
- Round-Optimal Password-Based Authenticated Key Exchange
- Smooth Projective Hashing for Conditionally Extractable Commitments
- The Dark Side of “Black-Box” Cryptography or: Should We Trust Capstone?
- Collusion-free protocols
- Collusion-Free Protocols in the Mediated Model
- Efficient Identity-Based Encryption Without Random Oracles
- Oblivious signature-based envelope