scientific article; zbMATH DE number 1759794

From MaRDI portal
Publication:4536817

zbMath0989.68509MaRDI QIDQ4536817

Jesper Buus Nielsen, Ivan B. Damgård

Publication date: 6 August 2002


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (29)

Leakage-resilient cryptography from minimal assumptionsComposable Adaptive Secure Protocols Without Setup Under Polytime AssumptionsReceiver Selective Opening Security from Indistinguishability ObfuscationA black-box construction of fully-simulatable, round-optimal oblivious transfer from strongly uniform key agreementBounded Collusion ABE for TMs from IBETriply adaptive UC NIZKNew and improved constructions for partially equivocable public key encryptionPossibility and impossibility results for receiver selective opening secure PKE in the multi-challenge settingNon-committing encryption with constant ciphertext expansion from standard assumptionsPossibility and impossibility results for selective decommitmentsAdaptive zero-knowledge proofs and adaptively secure oblivious transferCryptography and cryptographic protocolsEfficient one-sided adaptively secure computationFeasibility and Infeasibility of Adaptively Secure Fully Homomorphic EncryptionConstant Round Adaptively Secure Protocols in the Tamper-Proof Hardware ModelRemoving Erasures with Explainable Hash Proof SystemsAdaptive Security with Quasi-Optimal RateSimulation-based receiver selective opening CCA secure PKE from standard computational assumptionsRound-preserving parallel composition of probabilistic-termination cryptographic protocolsCryptography in the multi-string modelPossibility and Impossibility Results for Encryption and Commitment Secure under Selective OpeningOn the power of secure two-party computationAdaptively secure MPC with sublinear communication complexityEfficient Oblivious Transfer from Lossy Threshold Homomorphic EncryptionOn selective-opening security of deterministic primitivesOn Adaptively Secure Multiparty Computation with a Short CRSRing signatures: Stronger definitions, and constructions without random oraclesOn black-box complexity of universally composable security in the CRS modelEquivocating Yao: Constant-Round Adaptively Secure Multiparty Computation in the Plain Model




This page was built for publication: