Non-Black-Box Simulation from One-Way Functions and Applications to Resettable Security
From MaRDI portal
Publication:2802147
DOI10.1137/130946083zbMath1384.94045OpenAlexW2338446747MaRDI QIDQ2802147
Rafael Pass, Kai-Min Chung, Karn Seth
Publication date: 25 April 2016
Published in: SIAM Journal on Computing (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1137/130946083
Related Items
Constant-round leakage-resilient zero-knowledge from collision resistance, Pattern matching on encrypted streams, Post-quantum resettably-sound zero knowledge, Non-interactive secure computation from one-way functions, Injective trapdoor functions via derandomization: how strong is Rudich's black-box barrier?, Injective trapdoor functions via derandomization: how strong is Rudich's black-box barrier?, Weak Zero-Knowledge beyond the Black-Box Barrier
Cites Work
- Unnamed Item
- Bit commitment using pseudorandomness
- Probabilistic encryption
- Definitions and properties of zero-knowledge proof systems
- How to construct constant-round zero-knowledge proof systems for NP
- Point Obfuscation and 3-Round Zero-Knowledge
- Resettable zero-knowledge (extended abstract)
- Bounded-concurrent secure multi-party computation with a dishonest majority
- New and improved constructions of non-malleable cryptographic protocols
- The Knowledge Complexity of Interactive Proof Systems
- A Pseudorandom Generator from any One-way Function
- Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems
- Foundations of Cryptography
- Computationally Sound Proofs
- Resolving the Simultaneous Resettability Conjecture and a New Non-Black-Box Simulation Strategy
- Black-box concurrent zero-knowledge requires \tilde {Ω} (log n ) rounds
- On the (im)possibility of obfuscating programs
- Constant-round non-malleable commitments from any one-way function
- Non-black-box simulation from one-way functions and applications to resettable security
- On the impossibility of approximate obfuscation and applications to resettable cryptography
- On the Composition of Public-Coin Zero-Knowledge Protocols
- On the Composition of Public-Coin Zero-Knowledge Protocols
- Theory of Cryptography
- Theory of Cryptography