From Passive to Covert Security at Low Cost
From MaRDI portal
Publication:3408191
DOI10.1007/978-3-642-11799-2_9zbMATH Open1274.94058OpenAlexW1528698042MaRDI QIDQ3408191FDOQ3408191
Authors: Martin Geisler, Jesper Buus Nielsen, Ivan B. Damgård
Publication date: 24 February 2010
Published in: Theory of Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-11799-2_9
Recommendations
- Usability aware secret protection with minimum cost
- scientific article; zbMATH DE number 1149908
- Practical covert authentication
- The price of active security in cryptographic protocols
- Security against covert adversaries: Efficient protocols for realistic adversaries
- Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries
- Covert security with public verifiability: faster, leaner, and simpler
- Mitigating covert channels based on analysis of the potential for communication
- Low-cost cryptography for privacy in RFID systems
Cites Work
- Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries
- Title not available (Why is that?)
- Secure multiparty computation goes live
- Scalable and Unconditionally Secure Multiparty Computation
- Sequential composition of protocols without simultaneous termination
- Perfectly-Secure MPC with Linear Communication Complexity
- Optimal amortized distributed consensus
- Scalable Multiparty Computation with Nearly Optimal Work and Resilience
- Title not available (Why is that?)
- From Passive to Covert Security at Low Cost
- Efficient Two Party and Multi Party Computation Against Covert Adversaries
Cited In (13)
- On the feasibility of consistent computations
- Financially backed covert security
- Robust publicly verifiable covert security: limited information leakage and guaranteed correctness with low overhead
- Secure outsourced computation
- NTRU prime: reducing attack surface at low cost
- Calling out cheaters: covert security with public verifiability
- Public verifiability in the covert model (almost) for free
- From Passive to Covert Security at Low Cost
- Efficient compiler to covert security with public verifiability for honest majority MPC
- Generic compiler for publicly verifiable covert multi-party computation
- Black-box transformations from passive to covert security with public verifiability
- Security against covert adversaries: Efficient protocols for realistic adversaries
- Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries
This page was built for publication: From Passive to Covert Security at Low Cost
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3408191)