scientific article; zbMATH DE number 1775426

From MaRDI portal
Publication:4542559

zbMath1028.68016MaRDI QIDQ4542559

Cynthia Dwork, Moni Naor, Amit Sahai

Publication date: 27 January 2004


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (46)

Concurrent knowledge extraction in public-key modelsOn the security loss of unique signaturesA note on the Dwork-Naor timed deniable authenticationFull and partial deniability for authentication schemesA novel deniable authentication protocol using generalized ElGamal signature schemeOn Constant-Round Concurrent Zero-Knowledge from a Knowledge AssumptionA new framework for deniable secure key exchangeExplainable argumentsIndistinguishable Proofs of Work or KnowledgeLower bounds and impossibility results for concurrent self compositionConcurrently composable non-interactive secure computationOn constant-round concurrent non-malleable proof systemsOn concurrent multi-party quantum computationIndividual simulationsConstant-Round Concurrent Non-malleable Zero Knowledge in the Bare Public-Key ModelLeakproof secret sharing protocols with applications to group identification schemeSZK proofs for black-box group problemsCryptography and cryptographic protocolsTimed encryption with application to deniable key exchangeQuantum deniable authentication protocolRandom walks and concurrent zero-knowledgeTimed signatures and zero-knowledge proofs -- timestamping in the blockchain eraCryptography Using Captcha PuzzlesNovel \(\Omega\)-protocols for NPUnifying simulatability definitions in cryptographic systems under different timing assumptionsMagic Adversaries Versus Individual Reduction: Science Wins Either WayLower bounds for non-black-box zero knowledgeOn expected probabilistic polynomial-time adversaries: a suggestion for restricted definitions and their benefitsPolling with Physical Envelopes: A Rigorous Analysis of a Human-Centric ProtocolCollusion-Free Protocols in the Mediated ModelCompletely Non-malleable Encryption RevisitedThe Round-Complexity of Black-Box Zero-Knowledge: A Combinatorial CharacterizationA new approach for UC security concurrent deniable authenticationA non-interactive deniable authentication scheme based on designated verifier proofsLocal Sequentiality Does Not Help for Concurrent CompositionA simple protocol for deniable authentication based on ElGamal cryptographyResettably Secure ComputationTARDIS: a foundation of time-lock puzzles in UCHybrid commitments and their applications to zero-knowledge proof systemsConcurrently Non-malleable Black-Box Zero Knowledge in the Bare Public-Key ModelDesignated Confirmer Signatures with Unified VerificationPrivate Coins versus Public Coins in Zero-Knowledge Proof SystemsImprovement of Fan et al.'s deniable authentication protocol based on Diffie-Hellman algorithmA new deniable authentication protocol from bilinear pairingsAdaptively secure distributed public-key systems.Generic transformation from broadcast encryption to round-optimal deniable ring authentication




This page was built for publication: