Information-theoretically secure protocols and security under composition
DOI10.1137/090755886zbMATH Open1202.94185OpenAlexW1977802313MaRDI QIDQ3053161FDOQ3053161
Authors: Eyal Kushilevitz, Yehuda Lindell, Tal Rabin
Publication date: 4 November 2010
Published in: SIAM Journal on Computing (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1137/090755886
Recommendations
- Information-theoretically secure protocols and security under composition
- General composition and universal composability in secure multiparty computation
- Secure composition of cryptographic protocols. (Abstract)
- Security and composition of multiparty cryptographic protocols
- Safely composing security protocols
Analysis of algorithms and problem complexity (68Q25) Cryptography (94A60) Computational difficulty of problems (lower bounds, completeness, difficulty of approximation, etc.) (68Q17)
Cited In (18)
- On the Necessity of Rewinding in Secure Multiparty Computation
- Security in Asynchronous Interactive Systems
- Efficient perfectly secure computation with optimal resilience
- Efficient perfectly secure computation with optimal resilience
- High-throughput secure three-party computation for malicious adversaries and an honest majority
- Title not available (Why is that?)
- Actively secure arithmetic computation and VOLE with constant computational overhead
- Perfect MPC over layered graphs
- Fast large-scale honest-majority MPC for malicious adversaries
- A full proof of the BGW protocol for perfectly secure multiparty computation
- Secure multi-party computation in large networks
- Information-Theoretic Security of Cryptographic Channels
- On constant-round concurrent zero-knowledge from a knowledge assumption
- High-throughput secure three-party computation with an honest majority
- Threshold fully homomorphic encryption over the torus
- Title not available (Why is that?)
- Efficient two-party exponentiation from quotient transfer
- Information-theoretically secure protocols and security under composition
This page was built for publication: Information-theoretically secure protocols and security under composition
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3053161)