Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
New notions of security - MaRDI portal

New notions of security

From MaRDI portal
Publication:3580997

DOI10.1145/1007352.1007394zbMath1192.94124OpenAlexW2085140050MaRDI QIDQ3580997

Manoj Prabhakaran, Amit Sahai

Publication date: 15 August 2010

Published in: Proceedings of the thirty-sixth annual ACM symposium on Theory of computing (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1145/1007352.1007394




Related Items

One-message zero knowledge and non-malleable commitmentsComposable Security in the Tamper-Proof Hardware Model Under Minimal ComplexityComposable Adaptive Secure Protocols Without Setup Under Polytime AssumptionsUnbounded ABE via bilinear entropy expansion, revisitedA unified and composable take on ratchetingConcurrently composable non-interactive secure computationA new approach to efficient non-malleable zero-knowledgeOn concurrent multi-party quantum computationTwo-round maliciously secure computation with super-polynomial simulationAdaptive security of multi-party protocols, revisitedEnvironmentally friendly composable multi-party computation in the plain model from standard (timed) assumptionsImpossibility results for universal composability in public-key models and with fixed inputsRound-efficient black-box construction of composable multi-party computationThe reactive simulatability (RSIM) framework for asynchronous systemsEfficient non-malleable commitment schemesComputing boundary cycle of a pseudo-triangle polygon from its visibility graphConstant Round Adaptively Secure Protocols in the Tamper-Proof Hardware ModelConcurrently Composable Security with Shielded Super-Polynomial SimulatorsOn the Exact Round Complexity of Self-composable Two-Party ComputationWhat security can we achieve within 4 rounds?Efficient non-malleable commitment schemesEfficient hybrid encryption from ID-based encryptionLocal Sequentiality Does Not Help for Concurrent CompositionAdaptive Hardness and Composable Security in the Plain Model from Standard AssumptionsWhat Security Can We Achieve Within 4 Rounds?General composition and universal composability in secure multiparty computationOvercoming impossibility results in composable security using interval-wise guaranteesConditional Reactive SimulatabilitySuccinct non-interactive secure computation