Calling out cheaters: covert security with public verifiability
From MaRDI portal
Publication:4911615
Recommendations
- Covert security with public verifiability: faster, leaner, and simpler
- Public verifiability in the covert model (almost) for free
- Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries
- Security against covert adversaries: Efficient protocols for realistic adversaries
- From Passive to Covert Security at Low Cost
Cited in
(15)- Making private function evaluation safer, faster, and simpler
- (Public) verifiability for composable protocols without adaptivity or zero-knowledge
- Financially backed covert security
- Robust publicly verifiable covert security: limited information leakage and guaranteed correctness with low overhead
- MPC-in-multi-heads: a multi-prover zero-knowledge proof system (or: how to jointly prove any NP statements in ZK)
- Public verifiability in the covert model (almost) for free
- Efficient compiler to covert security with public verifiability for honest majority MPC
- Putting the online phase on a diet: covert security from short MACs
- Generic compiler for publicly verifiable covert multi-party computation
- Towards accountability in CRS generation
- Black-box transformations from passive to covert security with public verifiability
- Efficient constant-round MPC with identifiable abort and public verifiability
- On publicly-accountable zero-knowledge and small shuffle arguments
- Covert security with public verifiability: faster, leaner, and simpler
- Hashing garbled circuits for free
This page was built for publication: Calling out cheaters: covert security with public verifiability
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4911615)