scientific article; zbMATH DE number 2009949
From MaRDI portal
Publication:4434869
Recommendations
- On the limitations of universally composable two-party computation without set-up assumptions
- Universally composable two-party and multi-party secure computation
- Bounded-concurrent secure two-party computation without setup assumptions
- Universally Composable Multi-party Computation Using Tamper-Proof Hardware
- Obtaining Universally Compoable Security: Towards the Bare Bones of Trust
Cited in
(30)- A note on universal composable zero-knowledge in the common reference string model
- Isolated Proofs of Knowledge and Isolated Zero Knowledge
- Obtaining Universally Compoable Security: Towards the Bare Bones of Trust
- On the structure of unconditional UC hybrid protocols
- On the relationships between notions of simulation-based security
- A zero-one law for cryptographic complexity with respect to computational UC security
- Compact, efficient and UC-secure isogeny-based oblivious transfer
- Towards accountability in CRS generation
- Adaptive hardness and composable security in the plain model from standard assumptions
- Universally composable incoercibility
- Universally-Composable Two-Party Computation in Two Rounds
- On the exact round complexity of self-composable two-party computation
- On the limitations of universally composable two-party computation without set-up assumptions
- Initiator-resilient universally composable key exchange
- Secure computation without authentication
- Long-term security and universal composability
- Universally composable two-party and multi-party secure computation
- Lower bounds and impossibility results for concurrent self composition
- Concurrently composable non-interactive secure computation
- A simpler variant of universally composable security for standard multiparty computation
- Verifiable relation sharing and multi-verifier zero-knowledge in two rounds: trading NIZKs with honest majority (extended abstract)
- The reactive simulatability (RSIM) framework for asynchronous systems
- Impossibility results for universal composability in public-key models and with fixed inputs
- Concurrently composable security with shielded super-polynomial simulators
- Universally composable anonymous hash certification model
- Local Sequentiality Does Not Help for Concurrent Composition
- Lower bounds for non-black-box zero knowledge
- Computational hardness of optimal fair computation: beyond Minicrypt
- On concurrent multi-party quantum computation
- A universally composable PAKE with zero communication cost. (And why it shouldn't be considered UC-secure)
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4434869)