Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article; zbMATH DE number 2009954 - MaRDI portal

scientific article; zbMATH DE number 2009954

From MaRDI portal
Publication:4434874

zbMath1037.68536MaRDI QIDQ4434874

Rafael Pass

Publication date: 26 November 2003

Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2656/26560160.htm

Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.


Lua error in Module:PublicationMSCList at line 37: attempt to index local 'msc_result' (a nil value).


Related Items (48)

A black-box approach to post-quantum zero-knowledge in constant roundsNon-malleable codes for bounded parallel-time tamperingOne-message zero knowledge and non-malleable commitmentsOn Non-Black-Box Simulation and the Impossibility of Approximate ObfuscationA note on the Dwork-Naor timed deniable authentication3-Message Zero Knowledge Against Human IgnoranceComposable Security in the Tamper-Proof Hardware Model Under Minimal ComplexityComposable Adaptive Secure Protocols Without Setup Under Polytime AssumptionsUnbounded ABE via bilinear entropy expansion, revisitedProofs of Work from worst-case assumptionsA unified and composable take on ratchetingOn Constant-Round Concurrent Zero-Knowledge from a Knowledge AssumptionMaliciously-secure MrNISC in the plain modelIndistinguishable Proofs of Work or KnowledgeConcurrently composable non-interactive secure computationKnowledge encryption and its applications to simulatable protocols with low round-complexityPublic-coin 3-round zero-knowledge from learning with errors and keyless multi-collision-resistant hashEfficient NIZK arguments with straight-line simulation and extractionA new approach to efficient non-malleable zero-knowledgeSteganography-free zero-knowledgeOn concurrent multi-party quantum computationCrowd verifiable zero-knowledge and end-to-end verifiable multiparty computationIndividual simulationsBlack-box impossibilities of obtaining 2-round weak ZK and strong WI from polynomial hardnessTwo-round maliciously secure computation with super-polynomial simulationAdaptive security of multi-party protocols, revisitedEnvironmentally friendly composable multi-party computation in the plain model from standard (timed) assumptionsImpossibility results for universal composability in public-key models and with fixed inputsRound-efficient black-box construction of composable multi-party computationComputing boundary cycle of a pseudo-triangle polygon from its visibility graphConstant Round Adaptively Secure Protocols in the Tamper-Proof Hardware ModelConcurrently Composable Security with Shielded Super-Polynomial SimulatorsOn the Exact Round Complexity of Self-composable Two-Party ComputationWhat security can we achieve within 4 rounds?Improved OR-Composition of Sigma-ProtocolsLocal Sequentiality Does Not Help for Concurrent CompositionStatistical Zaps and new oblivious transfer protocolsRound-optimal blind signatures in the plain model from classical and quantum standard assumptionsNon-interactive distributional indistinguishability (NIDI) and non-malleable commitmentsTowards accountability in CRS generationAdaptive Hardness and Composable Security in the Plain Model from Standard AssumptionsHybrid commitments and their applications to zero-knowledge proof systemsWhat Security Can We Achieve Within 4 Rounds?General composition and universal composability in secure multiparty computationConcurrent Non-Malleable Commitments (and More) in 3 RoundsOvercoming impossibility results in composable security using interval-wise guaranteesWeak Zero-Knowledge beyond the Black-Box BarrierSuccinct non-interactive secure computation




This page was built for publication: