Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article; zbMATH DE number 1942445 - MaRDI portal

scientific article; zbMATH DE number 1942445

From MaRDI portal
Publication:4409144

zbMath1028.94505MaRDI QIDQ4409144

Jesper Buus Nielsen, Ivan B. Damgård

Publication date: 30 June 2003

Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2442/24420581.htm

Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (37)

Threshold Schnorr with stateless deterministic signing from standard assumptionsNew Constructions of Efficient Simulation-Sound Commitments Using Encryption and Their ApplicationsEfficient RSA Key Generation and Threshold Paillier in the Two-Party SettingTightly secure signatures and public-key encryptionSomewhere statistically binding commitment schemes with applicationsEverlasting UC commitments from fully malicious PUFsLong-term security and universal composabilityCompact and Efficient UC Commitments Under Atomic-ExchangesEfficient RSA key generation and threshold Paillier in the two-party settingCumulatively all-lossy-but-one trapdoor functions from standard assumptionsNon-interactive zero-knowledge from non-interactive batch argumentsEfficient and round-optimal oblivious transfer and commitment with adaptive securityMore constructions of lossy and correlation-secure trapdoor functionsEfficient set operations in the presence of malicious adversariesConcurrent non-malleable statistically hiding commitmentResource fairness and composability of cryptographic protocolsFully Simulatable Quantum-Secure Coin-Flipping and ApplicationsAll-but-many encryptionEfficient one-sided adaptively secure computationEverlasting multi-party computationEfficient non-malleable commitment schemesScalable Multi-party Private Set-IntersectionEfficient non-malleable commitment schemesOn Notions of Security for Deterministic Encryption, and Efficient Constructions without Random OraclesA post-quantum UC-commitment scheme in the global random oracle model from code-based assumptionsEquivocal Blind Signatures and Adaptive UC-SecurityGeneric Construction of UC-Secure Oblivious TransferOn the Complexity of Additively Homomorphic UC CommitmentsFully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval modelCryptography in the multi-string modelHybrid commitments and their applications to zero-knowledge proof systemsImproving Practical UC-Secure Commitments Based on the DDH AssumptionUC Commitments for Modular Protocol Design and Applications to Revocation and Attribute TokensOn black-box complexity of universally composable security in the CRS modelFrom Passive to Covert Security at Low CostAlways have a backup plan: fully secure synchronous MPC with asynchronous fallbackInitiator-Resilient Universally Composable Key Exchange




This page was built for publication: