Foundations of Cryptography

From MaRDI portal
Publication:4826097

DOI10.1017/CBO9780511721656zbMath1068.94011WikidataQ57831066 ScholiaQ57831066MaRDI QIDQ4826097

Oded Goldreich

Publication date: 9 November 2004





Related Items (only showing first 100 items - show all)

Tighter security for Schnorr identification and signatures: a high-moment forking lemma for \({\varSigma }\)-protocolsA black-box approach to post-quantum zero-knowledge in constant roundsEfficient set intersection with simulation-based securityConcurrent knowledge extraction in public-key modelsSublinear GMW-style compiler for MPC with preprocessingSE-PSI: fog/cloud server-aided enhanced secure and effective private set intersection on scalable datasets with Bloom FilterAutomata evaluation and text search protocols with simulation-based securityFast cut-and-choose-based protocols for malicious and covert adversariesPerfect secure computation in two roundsEnhancements are blackbox non-trivial: impossibility of enhanced trapdoor permutations from standard trapdoor permutationsCertifying trapdoor permutations, revisitedConstant-round leakage-resilient zero-knowledge from collision resistanceCiphertext expansion in limited-leakage order-preserving encryption: a tight computational lower boundTwo attacks on rank metric code-based schemes: RankSign and an IBE schemeAn optimally fair coin tossA note on perfect correctness by derandomizationToward a game theoretic view of secure computationA simple post-quantum non-interactive zero-knowledge proof from garbled circuitsPerfectly-secure asynchronous MPC for general adversaries (extended abstract)Bit-oriented quantum public-key encryption based on quantum perfect encryptionOn the bit security of cryptographic primitivesCryptographic hardness of random local functions. SurveyPublic-key quantum digital signature scheme with one-time pad private-keyOn the security of joint signature and encryption revisitedConstant-round client-aided secure comparison protocolImproved signature schemes for secure multi-party computation with certified inputsRound-optimal and communication-efficient multiparty computationHighly efficient OT-based multiplication protocolsGuaranteed output in \(O(\sqrt{n})\) rounds for round-robin sampling protocolsAsymptotically quasi-optimal cryptographySecure multiparty computation with sublinear preprocessingChannels of small log-ratio leakage and characterization of two-party differentially private computationOn \(d\)-multiplicative secret sharingLong-term security and universal composabilityA note on constant-round zero-knowledge proofs of knowledgeOn server trust in private proxy auctionsQuantum one-way permutation over the finite field of two elementsSecure two-party computation via cut-and-choose oblivious transferGraph coloring applied to secure computation in non-abelian groupsPartial fairness in secure two-party computationThe hunting of the SNARKFairness versus guaranteed output delivery in secure multiparty computationConstant-round adaptive zero-knowledge proofs for NPMore constructions of lossy and correlation-secure trapdoor functionsPrivacy-preserving outsourcing of image feature extraction in cloud computingMore on average case vs approximation complexityPrivacy preserving linear regression modeling of distributed databasesEfficient set operations in the presence of malicious adversariesCommunication-efficient distributed oblivious transferSecure computation with low communication from cross-checkingImpossibility results for universal composability in public-key models and with fixed inputsLossy trapdoor functions from homomorphic reproducible encryptionPrivacy preserving distributed optimization using homomorphic encryptionResource fairness and composability of cryptographic protocolsAdaptive zero-knowledge proofs and adaptively secure oblivious transferSecure computation without authenticationPrivacy preserving OLAP over distributed XML data: A theoretically-sound secure-multiparty-computation approachTimed encryption with application to deniable key exchangeAuthenticated adversarial routingMulti-party computation with conversion of secret sharingPerennial secure multi-party computation of universal Turing machineComparing two sets without disclosing themSecure multiparty computation of solid geometric problems and their applicationsA black-box construction of non-malleable encryption from semantically secure encryptionA full proof of the BGW protocol for perfectly secure multiparty computationCryptographic protocol logic: satisfaction for (timed) Dolev-Yao cryptographySecure computation without computersOn the (im-)possibility of extending coin tossOblivious polynomial evaluation and secure set-intersection from algebraic PRFsCharacterization of secure multiparty computation without broadcastProviding data confidentiality against malicious hosts in shared data spacesConstant-round maliciously secure two-party computation in the RAM modelSome (in)sufficient conditions for secure hybrid encryptionSubtleties in the definition of IND-CCA: when and how should challenge decryption be disallowed?Secure extended wildcard pattern matching protocol from cut-and-choose oblivious transferPrivate set-intersection with common set-upPseudo-free families of computational universal algebrasEfficient and secure outsourced approximate pattern matching protocolOn expected constant-round protocols for Byzantine agreementHigh-performance multi-party computation for binary circuits based on oblivious transferKey-dependent message security: generic amplification and completenessBetter security for deterministic public-key encryption: the auxiliary-input settingComputationally secure pattern matching in the presence of malicious adversariesPrivate multiparty sampling and approximation of vector combinationsCompact designated verifier NIZKs from the CDH assumption without pairingsNew cryptographic hardness for learning intersections of halfspaces over Boolean cubes with membership queriesA proof of security of Yao's protocol for two-party computationCompact NIZKs from standard assumptions on bilinear mapsGoing beyond dual execution: MPC for functions with efficient verificationAnalyzing security protocols using time-bounded task-PIOAsHandling expected polynomial-time strategies in simulation-based security proofsSearchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensionsCryptographic pseudorandom generators can make cryptosystems problematicReducing complexity assumptions for statistically-hiding commitmentGeneral composition and universal composability in secure multiparty computationThreshold changeable secret sharing schemes revisitedOn the distribution of low Hamming weight productsCryptography with constant input localityMPC with friends and foesCryptographic one-way function based on boson sampling




This page was built for publication: Foundations of Cryptography