Robust publicly verifiable covert security: limited information leakage and guaranteed correctness with low overhead
From MaRDI portal
Publication:6595685
Recommendations
- Covert security with public verifiability: faster, leaner, and simpler
- Generic compiler for publicly verifiable covert multi-party computation
- Public verifiability in the covert model (almost) for free
- Calling out cheaters: covert security with public verifiability
- Black-box transformations from passive to covert security with public verifiability
Cites work
- A proof of security of Yao's protocol for two-party computation
- Black-box transformations from passive to covert security with public verifiability
- Calling out cheaters: covert security with public verifiability
- Covert security with public verifiability: faster, leaner, and simpler
- Efficient Two Party and Multi Party Computation Against Covert Adversaries
- Efficient compiler to covert security with public verifiability for honest majority MPC
- Efficient secure two-party computation using symmetric cut-and-choose
- Efficient secure two-party protocols. Techniques and constructions
- Fast cut-and-choose-based protocols for malicious and covert adversaries
- Financially backed covert security
- Foundations of Cryptography
- From Passive to Covert Security at Low Cost
- Garbled circuits checking garbled circuits: more efficient and secure two-party computation
- Generic compiler for publicly verifiable covert multi-party computation
- Going beyond dual execution: MPC for functions with efficient verification
- How to construct constant-round zero-knowledge proof systems for NP
- Making private function evaluation safer, faster, and simpler
- New protocols for secure equality test and comparison
- Public Key Cryptography - PKC 2006
- Public verifiability in the covert model (almost) for free
- Richer Efficiency/Security Trade-offs in 2PC
- Security against covert adversaries: Efficient protocols for realistic adversaries
- Towards practical homomorphic time-lock puzzles: applicability and verifiability
This page was built for publication: Robust publicly verifiable covert security: limited information leakage and guaranteed correctness with low overhead
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6595685)