Reverse firewalls for actively secure MPCs
From MaRDI portal
Publication:2096547
DOI10.1007/978-3-030-56880-1_26zbMath1504.94117OpenAlexW2991482101MaRDI QIDQ2096547
Suvradip Chakraborty, Jesper Buus Nielsen, Stefan Dziembowski
Publication date: 9 November 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-56880-1_26
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Computer security (68M25)
Related Items (7)
Subversion-resilient enhanced privacy ID ⋮ Universally composable subversion-resilient cryptography ⋮ Reverse firewalls for oblivious transfer extension and applications to zero-knowledge ⋮ Reverse firewalls for adaptively secure MPC without setup ⋮ Steganography-free zero-knowledge ⋮ Subversion-resilient public key encryption with practical watchdogs ⋮ Reverse firewalls for actively secure MPCs
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Two-round multiparty secure computation from minimal assumptions
- \(k\)-round multiparty computation from \(k\)-round oblivious transfer via garbled interactive circuits
- A new approach to round-optimal secure multiparty computation
- Security and composition of multiparty cryptographic protocols
- Subversion-resilient signatures: definitions, constructions and applications
- Reverse firewalls for actively secure MPCs
- Message Transmission with Reverse Firewalls—Secure Communication on Corrupted Machines
- Malleable Proof Systems and Applications
- Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE
- Waters Signatures with Optimal Security Reduction
- Cryptographic Reverse Firewalls
- Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions
- Authenticated Algorithms for Byzantine Agreement
- The Prisoners’ Problem and the Subliminal Channel
- Efficient Identity-Based Encryption Without Random Oracles
- Advances in Cryptology - CRYPTO 2003
- Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures
- Secure Multiparty Computation and Secret Sharing
- Two Round Multiparty Computation via Multi-key FHE
- Theory of Cryptography
This page was built for publication: Reverse firewalls for actively secure MPCs