scientific article; zbMATH DE number 1842511

From MaRDI portal
Publication:4783745

zbMath1003.94526MaRDI QIDQ4783745

Giuseppe Persiano, Rafail Ostrovsky, Alfredo De Santis, Giovanni Di Crescenzo, Amit Sahai

Publication date: 8 December 2002

Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2139/21390566

Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (55)

On Black-Box Extensions of Non-interactive Zero-Knowledge Arguments, and Signatures Directly from Simulation SoundnessWitness authenticating NIZKs and applicationsAnother look at extraction and randomization of Groth's zk-SNARKConstant-size structure-preserving signatures: generic constructions and simple assumptionsSelectively linkable group signatures -- stronger security and preserved verifiabilityGuaranteed output in \(O(\sqrt{n})\) rounds for round-robin sampling protocolsFiat-Shamir bulletproofs are non-malleable (in the algebraic group model)One-shot Fiat-Shamir-based NIZK arguments of composite residuosity and logarithmic-size ring signatures in the standard modelA Unified Framework for Non-universal SNARKsContinuously non-malleable secret sharing for general access structuresRound-optimal password-based authenticated key exchangeWitness-succinct universally-composable SNARKsPrivacy-preserving blueprintsQANIZK for adversary-dependent languages and their applicationsZero-Knowledge Accumulators and Set AlgebraNIZKs with an Untrusted CRS: Security in the Face of Parameter SubversionTriply adaptive UC NIZKStrong continuous non-malleable encoding schemes with tamper-detectionMultikey Fully Homomorphic Encryption and ApplicationsUsing fully homomorphic hybrid encryption to minimize non-interative zero-knowledge proofsUpdatable NIZKs from non-interactive zapsUnnamed ItemUniversally composable \(\varSigma \)-protocols in the global random-oracle modelPractical non-malleable codes from symmetric-key primitives in 2-split-state modelOn constant-round concurrent non-malleable proof systemsOn the exact round complexity of best-of-both-worlds multi-party computationMPC with synchronous security and asynchronous responsivenessComputational robust (fuzzy) extractors for CRS-dependent sources with minimal min-entropyContinuously non-malleable codes in the split-state modelLeakage-resilient ring signature schemesCryptography and cryptographic protocolsNon-Malleable Codes from Additive CombinatoricsEfficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRSTagged One-Time Signatures: Tight Security and Optimal Tag SizeVerifiable Elections That Scale for FreeLeakage-resilient group signature: definitions and constructionsNovel \(\Omega\)-protocols for NPPost-challenge leakage in public-key encryptionPerfect Non-interactive Zero Knowledge for NPA Discrete-Logarithm Based Non-interactive Non-malleable Commitment Scheme with an Online Knowledge ExtractorCompletely Non-malleable Encryption RevisitedMulti-theorem preprocessing NIZKs from latticesFully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval modelA Transform for NIZK Almost as Efficient and General as the Fiat-Shamir Transform Without Programmable Random OraclesExpedient Non-malleability Notions for Hash FunctionsCryptography in the multi-string modelA Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext AttacksNew constructions of statistical NIZKs: dual-mode DV-NIZKs and moreSecure software leasingAbuse resistant law enforcement access systemsHybrid commitments and their applications to zero-knowledge proof systemsConcurrently Non-malleable Black-Box Zero Knowledge in the Bare Public-Key ModelNon-interactive CCA2-secure threshold cryptosystems: achieving adaptive security in the standard model without pairingsLeakage resilience from program obfuscationEfficiency Preserving Transformations for Concurrent Non-malleable Zero Knowledge




This page was built for publication: