Leakage-Resilient Coin Tossing
DOI10.1007/978-3-642-24100-0_16zbMATH Open1350.68042OpenAlexW1888689086MaRDI QIDQ3095326FDOQ3095326
Authors: Elette Boyle, Yael Tauman Kalai, Shafi Goldwasser
Publication date: 28 October 2011
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: http://hdl.handle.net/1721.1/71675
Recommendations
- Leakage-resilient coin tossing
- On the leakage-resilient key exchange
- Leakage-resilient cryptography from minimal assumptions
- Leakage-resilient cryptography from minimal assumptions
- Leakage Resilient Cheating Detectable Secret Sharing Schemes
- Secure computation from leaky correlated randomness
- Leakage-resilient riffle shuffle
- Practical leakage-resilient symmetric cryptography
- Leakage resilient secret sharing and applications
- Adaptively secure coin-flipping, revisited
Randomized algorithms (68W20) Cryptography (94A60) Distributed algorithms (68W15) Distributed systems (68M14) Authentication, digital signatures and secret sharing (94A62) Network protocols (68M12)
Cites Work
- How to share a secret
- Simultaneous Hardcore Bits and Cryptography against Memory Attacks
- Public-Key Cryptosystems Resilient to Key Leakage
- Theory of Cryptography
- Leakage-resilient zero knowledge
- Advances in Cryptology - CRYPTO 2003
- An Optimally Fair Coin Toss
- Title not available (Why is that?)
- Deterministic extractors for small-space sources
- Flipping Persuasively in Constant Time
- Distributed public key schemes secure against continual leakage
- 2-Source Extractors under Computational Assumptions and Cryptography with Defective Randomness
- Program obfuscation with leaky hardware
- Leakage-resilient coin tossing
- Distributed Computing
Cited In (11)
- Transmutation scheme of coin flipping protocol and utilization
- Robust Coin Flipping
- Leakage resilience of the Blom's key distribution scheme
- SCRAPE: scalable randomness attested by public entities
- Impossibility of black-box simulation against leakage attacks
- Protecting distributed primitives against leakage: equivocal secret sharing and more
- Short leakage resilient and non-malleable secret sharing schemes
- Leakage-resilient coin tossing
- Must the communication graph of MPC protocols be an expander?
- From fairness to full security in multiparty computation
- On the local leakage resilience of linear secret sharing schemes
This page was built for publication: Leakage-Resilient Coin Tossing
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3095326)