On Adaptively Secure Protocols
From MaRDI portal
Publication:2922675
DOI10.1007/978-3-319-10879-7_26zbMath1378.94067OpenAlexW215335028MaRDI QIDQ2922675
Muthuramakrishnan Venkitasubramaniam
Publication date: 14 October 2014
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-10879-7_26
Related Items (9)
Composable Adaptive Secure Protocols Without Setup Under Polytime Assumptions ⋮ Unbounded ABE via bilinear entropy expansion, revisited ⋮ Statistical concurrent non-malleable zero-knowledge from one-way functions ⋮ Computing boundary cycle of a pseudo-triangle polygon from its visibility graph ⋮ Constant Round Adaptively Secure Protocols in the Tamper-Proof Hardware Model ⋮ Concurrently Composable Security with Shielded Super-Polynomial Simulators ⋮ Adaptively secure MPC with sublinear communication complexity ⋮ Virtual Smart Cards: How to Sign with a Password and a Server ⋮ Equivocating Yao: Constant-Round Adaptively Secure Multiparty Computation in the Plain Model
This page was built for publication: On Adaptively Secure Protocols