scientific article; zbMATH DE number 1842484

From MaRDI portal
Publication:4783717

zbMath1002.94528MaRDI QIDQ4783717

Ran Canetti, Marc Fischlin

Publication date: 8 December 2002

Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2139/21390019

Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (only showing first 100 items - show all)

Compact and tightly selective-opening secure public-key encryption schemesLifting standard model reductions to common setup assumptionsUniversally composable \(\varSigma \)-protocols in the global random-oracle modelGUC-secure commitments via random oracles: new impossibility and feasibilityCategorical composable cryptographyCompleteness theorems for adaptively secure broadcastOn concurrent multi-party quantum computationOn the concurrent composition of quantum zero-knowledgeTwo-round adaptively secure multiparty computation from standard assumptionsComposition with knowledge assumptionsComposable Security in the Tamper-Proof Hardware Model Under Minimal ComplexityComposable Adaptive Secure Protocols Without Setup Under Polytime AssumptionsThe wonderful world of global random oraclesEverlasting UC commitments from fully malicious PUFsUniversally composable subversion-resilient cryptographyFeasibility and infeasibility of secure computation with malicious PUFsLong-term security and universal composabilityOn Constant-Round Concurrent Zero-Knowledge from a Knowledge AssumptionThe Simplest Protocol for Oblivious TransferSecure two-party computation via cut-and-choose oblivious transferGeneralizing Efficient Multiparty ComputationLinearly homomorphic structure-preserving signatures and their applicationsEfficient and universally composable single secret leader election from pairingsA universally composable PAKE with zero communication cost. (And why it shouldn't be considered UC-secure)Structure-Preserving Smooth Projective HashingIndistinguishable Proofs of Work or KnowledgeEfficient Generic Zero-Knowledge Proofs from Commitments (Extended Abstract)Universally Composable Cryptographic Role-Based Access Control(Efficient) universally composable oblivious transfer using a minimal number of stateless tokensFully-secure MPC with minimal trustImproved straight-line extraction in the random oracle model with applications to signature aggregationTriply adaptive UC NIZKMix-nets from re-randomizable and replayable CCA-secure public-key encryptionNew and improved constructions for partially equivocable public key encryptionBlack-box anonymous commit-and-proveLower bounds and impossibility results for concurrent self compositionOn constant-round concurrent non-malleable proof systemsShorter quasi-adaptive NIZK proofs for linear subspacesConstant-round adaptive zero-knowledge proofs for NPUniversally Composable Undeniable SignatureEnvironmentally friendly composable multi-party computation in the plain model from standard (timed) assumptionsRobust digital signature revisitedNon-malleable vector commitments via local equivocabilityImpossibility results for universal composability in public-key models and with fixed inputsPossibility and impossibility results for selective decommitmentsRound-efficient black-box construction of composable multi-party computationA Universally Composable Group Key Exchange Protocol with Minimum Communication EffortResource fairness and composability of cryptographic protocolsAdaptive zero-knowledge proofs and adaptively secure oblivious transferSecure computation without authenticationThe reactive simulatability (RSIM) framework for asynchronous systemsAll-but-many encryptionEfficient one-sided adaptively secure computationUnconditionally secure quantum bit commitment based on the uncertainty principleEverlasting multi-party computationOn the (im-)possibility of extending coin tossEfficient non-malleable commitment schemesEfficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRSCryptography Using Captcha PuzzlesConstant Round Adaptively Secure Protocols in the Tamper-Proof Hardware ModelRemoving Erasures with Explainable Hash Proof SystemsFormal Abstractions for Attested Execution Secure ProcessorsConcurrently Composable Security with Shielded Super-Polynomial SimulatorsEfficient non-malleable commitment schemesOn the (Im-)Possibility of Extending Coin TossA Discrete-Logarithm Based Non-interactive Non-malleable Commitment Scheme with an Online Knowledge ExtractorUniversally Composable Adaptive Oblivious TransferA post-quantum UC-commitment scheme in the global random oracle model from code-based assumptionsThe Layered Games Framework for Specifications and Analysis of Security ProtocolsGeneric Construction of UC-Secure Oblivious TransferOn the Complexity of Additively Homomorphic UC CommitmentsNon-malleable vector commitments via local equivocabilityVerifying quantum computations at scale: A cryptographic leash on quantum devicesGNUC: a new universal composability frameworkDavid and Goliath Commitments: UC Computation for Asymmetric Parties Using Tamper-Proof HardwareContributory Password-Authenticated Group Key Exchange with Join CapabilityA note on universal composable zero-knowledge in the common reference string modelLocal Sequentiality Does Not Help for Concurrent CompositionCryptography in the multi-string modelPossibility and Impossibility Results for Encryption and Commitment Secure under Selective OpeningResettably Secure ComputationTowards accountability in CRS generationOn the relationships between notions of simulation-based securityConstructing Universally Composable Oblivious Transfers from Double Trap-Door EncryptionsAdaptive Hardness and Composable Security in the Plain Model from Standard AssumptionsUniversally Composable Private Proximity TestingHybrid commitments and their applications to zero-knowledge proof systemsOn Adaptively Secure Multiparty Computation with a Short CRSImproving Practical UC-Secure Commitments Based on the DDH AssumptionGeneral composition and universal composability in secure multiparty computationRate-1, Linear Time and Additively Homomorphic UC CommitmentsUC Commitments for Modular Protocol Design and Applications to Revocation and Attribute TokensOn black-box complexity of universally composable security in the CRS modelOn the Necessary and Sufficient Assumptions for UC ComputationEye for an Eye: Efficient Concurrent Zero-Knowledge in the Timing ModelConstant-Round Nonmalleable Commitments from Any One-Way FunctionUniversally Composable Security Analysis of TLSOvercoming impossibility results in composable security using interval-wise guaranteesQuantifying the security cost of migrating protocols to practiceAlways have a backup plan: fully secure synchronous MPC with asynchronous fallback




This page was built for publication: