Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries

From MaRDI portal
Publication:3596377

DOI10.1007/978-3-540-70936-7_8zbMath1129.94010OpenAlexW1515945955MaRDI QIDQ3596377

Yonatan Aumann, Yehuda Lindell

Publication date: 30 August 2007

Published in: Theory of Cryptography (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-540-70936-7_8




Related Items (26)

Efficient set intersection with simulation-based securityAlmost-Optimally Fair Multiparty Coin-Tossing with Nearly Three-Quarters MaliciousPutting the online phase on a diet: covert security from short MACsAlmost-optimally fair multiparty coin-tossing with nearly three-quarters maliciousPartial fairness in secure two-party computationFinancially backed covert securityTwo-round stateless deterministic two-party Schnorr signatures from pseudorandom correlation functionsLearning under \(p\)-tampering poisoning attacksEfficient set operations in the presence of malicious adversariesOn actively-secure elementary MPC reductionsSecure Outsourced ComputationCryptographic and physical zero-knowledge proof systems for solutions of Sudoku puzzlesEfficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert AdversariesEfficient protocols for set intersection and pattern matching with security against malicious and covert adversariesSecure Set Intersection with Untrusted Hardware TokensEfficient Fully-Simulatable Oblivious TransferGeneric compiler for publicly verifiable covert multi-party computationOn publicly-accountable zero-knowledge and small shuffle argumentsFrom Passive to Covert Security at Low CostTruly Efficient String Oblivious Transfer Using Resettable Tamper-Proof TokensSecure linear system computation in the presence of malicious adversariesEconomically Optimal Variable Tag Length Message AuthenticationOn succinct arguments and witness encryption from groupsBlack-box transformations from passive to covert security with public verifiabilityEfficient compiler to covert security with public verifiability for honest majority MPCHashing Garbled Circuits for Free




This page was built for publication: Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries