Distinguisher-dependent simulation in two rounds and its applications
From MaRDI portal
Publication:1678369
DOI10.1007/978-3-319-63715-0_6zbMath1409.94880OpenAlexW2611973433MaRDI QIDQ1678369
Dakshita Khurana, Yael Tauman Kalai, Abhishek Jain, Ron D. Rothblum
Publication date: 15 November 2017
Full work available at URL: https://doi.org/10.1007/978-3-319-63715-0_6
Related Items (23)
A black-box approach to post-quantum zero-knowledge in constant rounds ⋮ Three-round secure multiparty computation from black-box two-round oblivious transfer ⋮ Two-message statistically sender-private OT from LWE ⋮ Knowledge encryption and its applications to simulatable protocols with low round-complexity ⋮ Public-coin 3-round zero-knowledge from learning with errors and keyless multi-collision-resistant hash ⋮ Two-round adaptively secure MPC from isogenies, LPN, or CDH ⋮ Statistically sender-private OT from LPN and derandomization ⋮ A new framework for quantum oblivious transfer ⋮ A framework for statistically sender private OT with optimal rate ⋮ Individual simulations ⋮ Simpler statistically sender private oblivious transfer from ideals of cyclotomic integers ⋮ Cryptographic group actions and applications ⋮ The round complexity of quantum zero-knowledge ⋮ Black-box impossibilities of obtaining 2-round weak ZK and strong WI from polynomial hardness ⋮ Statistical ZAPs from group-based assumptions ⋮ Two-round maliciously secure computation with super-polynomial simulation ⋮ Statistical ZAP arguments ⋮ Statistical Zaps and new oblivious transfer protocols ⋮ Witness indistinguishability for any single-round argument with applications to access control ⋮ Non-interactive distributional indistinguishability (NIDI) and non-malleable commitments ⋮ New techniques for zero-knowledge: leveraging inefficient provers to reduce assumptions, interaction, and trust ⋮ Weak Zero-Knowledge beyond the Black-Box Barrier ⋮ Two-round oblivious transfer from CDH or LPN
This page was built for publication: Distinguisher-dependent simulation in two rounds and its applications