Efficient secure two-party protocols. Techniques and constructions

From MaRDI portal
Publication:983160

DOI10.1007/978-3-642-14303-8zbMath1208.68005OpenAlexW1666126665MaRDI QIDQ983160

Yehuda Lindell, Carmit Hazay

Publication date: 3 August 2010

Published in: Information Security and Cryptography (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-14303-8




Related Items (45)

Non-interactive half-aggregation of EdDSA and variants of Schnorr signaturesA compressed \(\varSigma \)-protocol theory for latticesAutomata evaluation and text search protocols with simulation-based securityFast cut-and-choose-based protocols for malicious and covert adversariesRound optimal black-box ``commit-and-proveAn optimally fair coin tossEfficient Multi-party Computation: From Passive to Active Security via Secure SIMD CircuitsGeneric plaintext equality and inequality proofsHow (not) to achieve both coercion resistance and cast as intended verifiability in remote evotingA simple post-quantum non-interactive zero-knowledge proof from garbled circuitsImproved zero-knowledge argument of encrypted extended permutationSecure parameterized pattern matchingMaking Private Function Evaluation Safer, Faster, and SimplerThe Simplest Protocol for Oblivious TransferSecure two-party computation via cut-and-choose oblivious transferA Multi-Party Protocol for Privacy-Preserving Cooperative Linear Systems of EquationsSecure two-party input-size reduction: challenges, solutions and applicationsEfficient RSA key generation and threshold Paillier in the two-party settingLattice-based signatures with tight adaptive corruptions and moreAchievable \textsf{CCA2} relaxation for homomorphic encryptionFast two-party signature for upgrading ECDSA to two-party scenario easilyBrakedown: linear-time and field-agnostic SNARKs for R1CSParallel repetition of \((k_1,\dots ,k_{\mu }) \)-special-sound multi-round interactive proofsProgram synthesis for interactive-security systemsHalf-tree: halving the cost of tree expansion in COT and DPFPrivacy preserving distributed optimization using homomorphic encryptionCryptographic reverse firewalls for interactive proof systemsAdaptive zero-knowledge proofs and adaptively secure oblivious transferEfficient and Secure Generalized Pattern Matching via Fast Fourier TransformOblivious polynomial evaluation and secure set-intersection from algebraic PRFsActively secure garbled circuits with constant communication overhead in the plain modelOblivious DFA evaluation on joint input and its applicationsSecure extended wildcard pattern matching protocol from cut-and-choose oblivious transferFast secure two-party ECDSA signingFrom fairness to full security in multiparty computationFormalising \(\varSigma\)-protocols and commitment schemes using cryptholEfficient and secure outsourced approximate pattern matching protocol\(k\)-critical graphs in \(P_5\)-free graphsComputationally secure pattern matching in the presence of malicious adversariesSecurity of hedged Fiat-Shamir signatures under fault attacksCompact, efficient and UC-secure isogeny-based oblivious transferAn improvement of multi-exponentiation with encrypted bases argument: smaller and fasterBlack-box transformations from passive to covert security with public verifiabilityHow to Simulate It – A Tutorial on the Simulation Proof TechniqueHierarchical and dynamic threshold Paillier cryptosystem without trusted dealer




This page was built for publication: Efficient secure two-party protocols. Techniques and constructions