Abuse resistant law enforcement access systems
From MaRDI portal
Publication:2056806
DOI10.1007/978-3-030-77883-5_19zbMath1479.94181OpenAlexW3157587990MaRDI QIDQ2056806
Publication date: 8 December 2021
Full work available at URL: https://doi.org/10.1007/978-3-030-77883-5_19
Related Items
Anamorphic encryption: private communication against a dictator ⋮ Privacy-preserving blueprints ⋮ PAPR: publicly auditable privacy revocation for anonymous credentials ⋮ End-to-end secure messaging with traceability only for illegal content
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Translucent cryptography -- an alternative to key escrow, and its implementation via fractional oblivious transfer
- The wonderful world of global random oracles
- Ouroboros Praos: an adaptively-secure, semi-synchronous proof-of-stake blockchain
- Verifiable delay functions
- Bitcoin as a transaction ledger: a composable treatment
- Ouroboros: a provably secure proof-of-stake blockchain protocol
- Overcoming cryptographic impossibility results using blockchains
- How to build time-lock encryption
- Break-glass encryption
- Founding secure computation on blockchains
- Witness Encryption from Instance Independent Assumptions
- On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input
- How to Use Bitcoin to Design Fair Protocols
- Resettable Statistical Zero Knowledge
- Efficient Non-interactive Secure Computation
- Universally composable two-party and multi-party secure computation
- LEGO for Two-Party Secure Computation
- Universally-Composable Two-Party Computation in Two Rounds
- Non-Interactive Secure Computation Based on Cut-and-Choose
- Advances in Cryptology - CRYPTO 2003
- Modeling Bitcoin Contracts by Timed Automata
- On Extractability Obfuscation