Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Black-Box Constructions of Composable Protocols without Set-Up - MaRDI portal

Black-Box Constructions of Composable Protocols without Set-Up

From MaRDI portal
Publication:2914276

DOI10.1007/978-3-642-32009-5_27zbMath1296.94129OpenAlexW2184813257MaRDI QIDQ2914276

Huijia Lin, Rafael Pass

Publication date: 25 September 2012

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-32009-5_27




Related Items (19)

Continuous NMC secure against permutations and overwrites, with applications to CCA secure commitmentsTowards a unified approach to black-box constructions of zero-knowledge proofsComposable Adaptive Secure Protocols Without Setup Under Polytime AssumptionsStatistical Concurrent Non-malleable Zero-Knowledge from One-Way FunctionsRound-Optimal Black-Box Two-Party ComputationUnbounded ABE via bilinear entropy expansion, revisitedNon-malleable commitments against quantum attacksImproved, black-box, non-malleable encryption from semantic securityStatistical concurrent non-malleable zero-knowledge from one-way functionsPost-quantum simulatable extraction with minimal assumptions: black-box and constant-roundTwo-Round and Non-Interactive Concurrent Non-Malleable Commitments from Time-Lock PuzzlesRound-efficient black-box construction of composable multi-party computationA black-box construction of non-malleable encryption from semantically secure encryptionComputing boundary cycle of a pseudo-triangle polygon from its visibility graphConcurrently Composable Security with Shielded Super-Polynomial SimulatorsOn the Exact Round Complexity of Self-composable Two-Party ComputationAdaptive Hardness and Composable Security in the Plain Model from Standard AssumptionsOn black-box complexity of universally composable security in the CRS modelRound-optimal black-box commit-and-prove with succinct communication




This page was built for publication: Black-Box Constructions of Composable Protocols without Set-Up