Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article; zbMATH DE number 1759782 - MaRDI portal

scientific article; zbMATH DE number 1759782

From MaRDI portal
Publication:4536805

zbMath0989.94517MaRDI QIDQ4536805

Moni Naor, Dan Boneh

Publication date: 6 August 2002


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (40)

A note on the Dwork-Naor timed deniable authenticationSoK: communication across distributed ledgersMulti-instance publicly verifiable time-lock puzzle and its applicationsVersatile and sustainable timed-release encryption and sequential time-lock puzzles (extended abstract)CRAFT: \underline{C}omposable \underline{R}andomness beacons and output-independent \underline{A}bort MPC \underline{F}rom \underline{T}imeSimple, fast, efficient, and tightly-secure non-malleable non-interactive timed commitmentsTransparent batchable time-lock puzzles and applications to Byzantine consensusQuantum multi-party fair exchange protocol based on three-particle GHZ statesPractical statistically-sound proofs of exponentiation in any groupTimed-release computational secret sharing and threshold encryptionMemory-hard puzzles in the standard model with applications to memory-hard functions and resource-bounded locally decodable codesShort-lived zero-knowledge proofs and signaturesAstrolabous: a universally composable time-lock encryption schemeTime-release cryptography from minimal circuit assumptionsPartial fairness in secure two-party computationTowards practical homomorphic time-lock puzzles: applicability and verifiabilityApplications of timed-release encryption with implicit authenticationCompleteness theorems for adaptively secure broadcastLattice-based timed cryptographyTwo-Round and Non-Interactive Concurrent Non-Malleable Commitments from Time-Lock PuzzlesEnvironmentally friendly composable multi-party computation in the plain model from standard (timed) assumptions\(1/p\)-secure multiparty computation without an honest majority and the best of both worldsResource fairness and composability of cryptographic protocolsTimed encryption with application to deniable key exchangeMinting mechanism for proof of stake blockchainsTimed signatures and zero-knowledge proofs -- timestamping in the blockchain eraContract signing, optimism, and advantageFormal Abstractions for Attested Execution Secure ProcessorsBasing Weak Public-Key Cryptography on Strong One-Way FunctionsCryptography and Game Theory: Designing Protocols for Exchanging InformationAccumulable Optimistic Fair Exchange from Verifiably Encrypted Homomorphic SignaturesHow to build time-lock encryptionEfficient verifiable delay functionsContinuous verifiable delay functionsFair Threshold Decryption with Semi-Trusted Third PartiesTARDIS: a foundation of time-lock puzzles in UCTowards a security model for computational puzzle schemesOn Complete Primitives for FairnessTimed-Release Encryption RevisitedNew \((k,l,m)\)-verifiable multi-secret sharing schemes based on XTR public key system




This page was built for publication: