Advances in Cryptology - CRYPTO 2003

From MaRDI portal
Publication:5428128

DOI10.1007/b11817zbMath1122.94394OpenAlexW2480001466WikidataQ56235047 ScholiaQ56235047MaRDI QIDQ5428128

Rafael Pass

Publication date: 28 November 2007

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/b11817




Related Items (44)

Non-interactive half-aggregation of EdDSA and variants of Schnorr signaturesAn efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniableInteractive Oracle ProofsUnprovable security of perfect NIZK and non-interactive non-malleable commitmentsRound-optimal black-box protocol compilersFiat-Shamir bulletproofs are non-malleable (in the algebraic group model)Online-extractability in the quantum random-oracle modelSuccinct arguments in the quantum random oracle modelA new framework for deniable secure key exchangeExplainable argumentsBlack-box reusable NISC with random oraclesWitness-succinct universally-composable SNARKsSpartan and bulletproofs are simulation-extractable (for free!)NIZKs with an Untrusted CRS: Security in the Face of Parameter SubversionDSH: Deniable Secret Handshake FrameworkImproved straight-line extraction in the random oracle model with applications to signature aggregationShort-lived zero-knowledge proofs and signaturesAugmented random oraclesEfficient NIZK arguments with straight-line simulation and extractionA new approach to efficient non-malleable zero-knowledgeUniversally composable \(\varSigma \)-protocols in the global random-oracle modelGUC-secure commitments via random oracles: new impossibility and feasibilityEndemic oblivious transfer via random oracles, revisitedEfficient and round-optimal oblivious transfer and commitment with adaptive securityThe round complexity of quantum zero-knowledgeShort undeniable signatures based on group homomorphismsHow to Build a Hash Function from Any Collision-Resistant FunctionTimed encryption with application to deniable key exchangeNon-adaptive programmability of random oracleSublinear Zero-Knowledge Arguments for RAM ProgramsPerfect Non-interactive Zero Knowledge for NPOne-Time ProgramsFully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval modelA Transform for NIZK Almost as Efficient and General as the Fiat-Shamir Transform Without Programmable Random OraclesTwo-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from latticesTwo-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from latticesA note on universal composable zero-knowledge in the common reference string modelEfficient verifiable delay functionsDesignated Confirmer Signatures with Unified VerificationNew approaches for deniable authenticationEfficiency Limitations for Σ-Protocols for Group HomomorphismsA second note on the feasibility of generalized universal composabilityHow to Simulate It – A Tutorial on the Simulation Proof TechniqueGeneric transformation from broadcast encryption to round-optimal deniable ring authentication




This page was built for publication: Advances in Cryptology - CRYPTO 2003