Universally Composable Security with Global Setup

From MaRDI portal
Publication:3596372

DOI10.1007/978-3-540-70936-7_4zbMath1129.94014OpenAlexW1562226375MaRDI QIDQ3596372

Yevgeniy Dodis, Ran Canetti, Shabsi Walfish, Rafael Pass

Publication date: 30 August 2007

Published in: Theory of Cryptography (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-540-70936-7_4




Related Items (75)

Two-round adaptively secure multiparty computation from standard assumptionsPattern matching on encrypted streamsRevisiting key-alternating Feistel ciphers for shorter keys and multi-user security3-Message Zero Knowledge Against Human IgnoranceComposable Security in the Tamper-Proof Hardware Model Under Minimal ComplexityComposable Adaptive Secure Protocols Without Setup Under Polytime AssumptionsIncoercible Multi-party Computation and Universally Composable Receipt-Free VotingPayment trees: low collateral payments for payment channel networksUC-secure cryptographic reverse firewall-guarding corrupted systems with the minimum trusted moduleThe wonderful world of global random oraclesEmbedding the UC model into the IITM modelFeasibility and infeasibility of secure computation with malicious PUFsComposable and finite computational security of quantum message transmissionLong-term security and universal composabilityCompact and Efficient UC Commitments Under Atomic-ExchangesLinearly homomorphic structure-preserving signatures and their applicationsWitness-succinct universally-composable SNARKsCRAFT: \underline{C}omposable \underline{R}andomness beacons and output-independent \underline{A}bort MPC \underline{F}rom \underline{T}imeUniversal Composition with Responsive EnvironmentsFormalizing delayed adaptive corruptions and the security of flooding networksConcurrently composable non-interactive secure computationAstrolabous: a universally composable time-lock encryption schemeGeneralized channels from limited blockchain scripts and adaptor signaturesGiving an adversary guarantees (or: how to model designated verifier signatures in a composable framework)Algebraic adversaries in the universal composability frameworkA new approach to efficient non-malleable zero-knowledgeUniversally composable \(\varSigma \)-protocols in the global random-oracle model(Public) verifiability for composable protocols without adaptivity or zero-knowledgeGUC-secure commitments via random oracles: new impossibility and feasibilityReputation at stake! A trust layer over decentralized ledger for multiparty computation and reputation-fair lotteryEndemic oblivious transfer via random oracles, revisitedOn constant-round concurrent non-malleable proof systemsUniversally Composable Simultaneous Broadcast against a Dishonest Majority and ApplicationsMPC with synchronous security and asynchronous responsivenessCrowd verifiable zero-knowledge and end-to-end verifiable multiparty computationAdaptive security of multi-party protocols, revisitedEnvironmentally friendly composable multi-party computation in the plain model from standard (timed) assumptionsOn the (Ir)replaceability of global setups, or how (not) to use a global ledgerEtherless Ethereum Tokens: simulating native tokens in EthereumThe IITM model: a simple and expressive model for universal composabilityJoint state composition theorems for public-key encryption and digital signature functionalities with local computationNon-interactive secure computation from one-way functionsA universally composable framework for the privacy of email ecosystemsPossibility and impossibility results for selective decommitmentsA Universally Composable Group Key Exchange Protocol with Minimum Communication EffortSecure computation without authenticationHow to Build a Hash Function from Any Collision-Resistant FunctionTimed signatures and zero-knowledge proofs -- timestamping in the blockchain eraEverlasting multi-party computationBetter Two-Round Adaptive Multi-party ComputationConstant Round Adaptively Secure Protocols in the Tamper-Proof Hardware ModelRemoving Erasures with Explainable Hash Proof SystemsFormal Abstractions for Attested Execution Secure ProcessorsConcurrently Composable Security with Shielded Super-Polynomial SimulatorsUniversally Composable Adaptive Oblivious TransferIdentity-based trapdoor mercurial commitments and applicationsA note on the feasibility of generalised universal composabilityGNUC: a new universal composability frameworkDavid and Goliath Commitments: UC Computation for Asymmetric Parties Using Tamper-Proof HardwareA note on universal composable zero-knowledge in the common reference string modelCryptography in the multi-string modelSignatures from sequential-OR proofsDynamic ad hoc clock synchronizationTARDIS: a foundation of time-lock puzzles in UCAdaptive Hardness and Composable Security in the Plain Model from Standard AssumptionsMultiparty cardinality testing for threshold private intersectionSteel: composable hardware-based stateful and randomised functional encryptionSafely composing security protocolsOn black-box complexity of universally composable security in the CRS modelConcise Mercurial Vector Commitments and Independent Zero-Knowledge Sets with Short ProofsQuantifying the security cost of migrating protocols to practiceA second note on the feasibility of generalized universal composabilityOrder-fairness for Byzantine consensusP2DEX: privacy-preserving decentralized cryptocurrency exchangeResource-restricted cryptography: revisiting MPC bounds in the proof-of-work era




This page was built for publication: Universally Composable Security with Global Setup