Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Black-Box Constructions of Two-Party Protocols from One-Way Functions - MaRDI portal

Black-Box Constructions of Two-Party Protocols from One-Way Functions

From MaRDI portal
Publication:3611779

DOI10.1007/978-3-642-00457-5_24zbMath1213.94126OpenAlexW1497093656MaRDI QIDQ3611779

Hoeteck Wee, Rafael Pass

Publication date: 3 March 2009

Published in: Theory of Cryptography (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-00457-5_24




Related Items (31)

A black-box approach to post-quantum zero-knowledge in constant roundsRound-optimal fully black-box zero-knowledge arguments from one-way permutationsRound optimal black-box ``commit-and-proveConstant-round leakage-resilient zero-knowledge from collision resistanceTowards a unified approach to black-box constructions of zero-knowledge proofsComposable Security in the Tamper-Proof Hardware Model Under Minimal ComplexitySecure Multiparty RAM Computation in Constant RoundsStatistical Concurrent Non-malleable Zero-Knowledge from One-Way FunctionsRound-Optimal Black-Box Two-Party ComputationUnbounded ABE via bilinear entropy expansion, revisitedImproved, black-box, non-malleable encryption from semantic securityStatistical concurrent non-malleable zero-knowledge from one-way functionsPost-quantum simulatable extraction with minimal assumptions: black-box and constant-roundBlack-box anonymous commit-and-proveSuccinct arguments for RAM programs via projection codesA new approach to efficient non-malleable zero-knowledgeOn constant-round concurrent non-malleable proof systemsConstant-round adaptive zero-knowledge proofs for NPBest of both worlds. Revisiting the spymasters double agent problemRound-efficient black-box construction of composable multi-party computationA black-box construction of non-malleable encryption from semantically secure encryptionComputing boundary cycle of a pseudo-triangle polygon from its visibility graphConstant Round Adaptively Secure Protocols in the Tamper-Proof Hardware ModelWhat security can we achieve within 4 rounds?On the power of secure two-party computationWhich languages have 4-round fully black-box zero-knowledge arguments from one-way functions?On the Existence of Extractable One-Way FunctionsConcurrent Non-Malleable Commitments (and More) in 3 RoundsOn black-box complexity of universally composable security in the CRS modelPrivate Coins versus Public Coins in Zero-Knowledge Proof SystemsRound-optimal black-box commit-and-prove with succinct communication







This page was built for publication: Black-Box Constructions of Two-Party Protocols from One-Way Functions