Cryptographic Reverse Firewalls
From MaRDI portal
Publication:2948399
DOI10.1007/978-3-662-46803-6_22zbMath1375.94152OpenAlexW2219924285MaRDI QIDQ2948399
Ilya Mironov, Noah Stephens-Davidowitz
Publication date: 30 September 2015
Published in: Advances in Cryptology - EUROCRYPT 2015 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-46803-6_22
Related Items (23)
Practical algorithm substitution attack on extractable signatures ⋮ Receiver-anonymity in rerandomizable RCCA-secure cryptosystems resolved ⋮ Access Control Encryption: Enforcing Information Flow with Cryptography ⋮ UC-secure cryptographic reverse firewall-guarding corrupted systems with the minimum trusted module ⋮ Subversion-resilient enhanced privacy ID ⋮ Universally composable subversion-resilient cryptography ⋮ Cliptography: Clipping the Power of Kleptographic Attacks ⋮ Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions ⋮ On access control encryption without sanitization ⋮ Reverse firewalls for oblivious transfer extension and applications to zero-knowledge ⋮ Reverse firewalls for adaptively secure MPC without setup ⋮ Identity-based encryption for fair anonymity applications: defining, implementing, and applying rerandomizable RCCA-secure IBE ⋮ Steganography-free zero-knowledge ⋮ Public-key generation with verifiable randomness ⋮ Subvert KEM to break DEM: practical algorithm-substitution attacks on public-key encryption ⋮ Cryptographic reverse firewalls for interactive proof systems ⋮ Immunization against complete subversion without random oracles ⋮ Subversion-resilient signatures: definitions, constructions and applications ⋮ Subversion-resilient public key encryption with practical watchdogs ⋮ Message Transmission with Reverse Firewalls—Secure Communication on Corrupted Machines ⋮ Backdoors in Pseudorandom Number Generators: Possibility and Impossibility Results ⋮ Reverse firewalls for actively secure MPCs ⋮ Security of Auditing Protocols Against Subversion Attacks
This page was built for publication: Cryptographic Reverse Firewalls