Concurrent Non-Malleable Commitments (and More) in 3 Rounds
暂无分享,去创建一个
Rafail Ostrovsky | Ivan Visconti | Luisa Siniscalchi | Michele Ciampi | R. Ostrovsky | Ivan Visconti | Michele Ciampi | Luisa Siniscalchi
[1] M. Robshaw. Edinburgh Research Explorer Concurrent Non-Malleable Commitments (and More) in 3 Rounds , 2018 .
[2] Daniele Venturi,et al. Fiat-Shamir for Highly Sound Protocols Is Instantiable , 2016, SCN.
[3] Silas Richelson,et al. Textbook non-malleable commitments , 2016, STOC.
[4] Sanjam Garg,et al. The Exact Round Complexity of Secure Computation , 2016, EUROCRYPT.
[5] Ivan Visconti,et al. Online/Offline OR Composition of Sigma Protocols , 2016, IACR Cryptol. ePrint Arch..
[6] Rafael Pass,et al. Unprovable Security of Perfect NIZK and Non-interactive Non-malleable Commitments , 2013, computational complexity.
[7] Rafail Ostrovsky,et al. On Round-Efficient Non-Malleable Protocols , 2016, IACR Cryptol. ePrint Arch..
[8] Ivan Visconti,et al. Improved OR Composition of Sigma-Protocols , 2016, IACR Cryptol. ePrint Arch..
[9] Silas Richelson,et al. Fast Non-Malleable Commitments , 2015, CCS.
[10] R. Pass,et al. Constant-Round Nonmalleable Commitments from Any One-Way Function , 2015, Journal of the ACM.
[11] Silas Richelson,et al. An Algebraic Approach to Non-malleability , 2014, 2014 IEEE 55th Annual Symposium on Foundations of Computer Science.
[12] Pratyay Mukherjee,et al. Continuous Non-malleable Codes , 2014, IACR Cryptol. ePrint Arch..
[13] Rafail Ostrovsky,et al. Constructing Non-malleable Commitments: A Black-Box Approach , 2012, 2012 IEEE 53rd Annual Symposium on Foundations of Computer Science.
[14] Ivan Visconti,et al. On Round-Optimal Zero Knowledge in the Bare Public-Key Model , 2012, EUROCRYPT.
[15] Rafail Ostrovsky,et al. Simultaneously Resettable Arguments of Knowledge , 2012, TCC.
[16] Rafail Ostrovsky,et al. Simultaneous Resettability from Collision Resistance , 2012, Electron. Colloquium Comput. Complex..
[17] Rafail Ostrovsky,et al. Revisiting Lower and Upper Bounds for Selective Decommitments , 2011, IACR Cryptol. ePrint Arch..
[18] Zhenfu Cao,et al. On constant-round concurrent non-malleable proof systems , 2011, Inf. Process. Lett..
[19] Vipul Goyal,et al. Constant round non-malleable protocols using one way functions , 2011, STOC '11.
[20] Rafael Pass,et al. Constant-round non-malleable commitments from any one-way function , 2011, STOC '11.
[21] Hoeteck Wee,et al. Black-Box, Round-Efficient Secure Computation via Non-malleability Amplification , 2010, 2010 IEEE 51st Annual Symposium on Foundations of Computer Science.
[22] Hoeteck Wee,et al. Constant-Round Non-malleable Commitments from Sub-exponential One-Way Functions , 2010, EUROCRYPT.
[23] Zhenfu Cao,et al. Constant-Round Concurrent Non-Malleable Statistically Binding Commitments and Decommitments , 2010, Public Key Cryptography.
[24] Yunlei Zhao,et al. Adaptive Concurrent Non-Malleability with Bare Public-Keys , 2009, IACR Cryptol. ePrint Arch..
[25] Manuel Blum,et al. How to Prove a Theorem So No One Else Can Claim It , 2010 .
[26] Rafael Pass,et al. A unified framework for concurrent security: universal composability from stand-alone non-malleability , 2009, STOC '09.
[27] Hoeteck Wee,et al. Black-Box Constructions of Two-Party Protocols from One-Way Functions , 2009, TCC.
[28] Rafail Ostrovsky,et al. Simulation-Based Concurrent Non-malleable Commitments and Decommitments , 2009, TCC.
[29] Ahmad-Reza Sadeghi,et al. Improved Security Notions and Protocols for Non-transferable Identification , 2008, ESORICS.
[30] Vinod Vaikuntanathan,et al. Adaptive One-Way Functions and Applications , 2008, CRYPTO.
[31] Rafail Ostrovsky,et al. Constant-Round Concurrent Non-malleable Zero Knowledge in the Bare Public-Key Model , 2008, ICALP.
[32] Rafael Pass,et al. Concurrent Non-malleable Commitments from Any One-Way Function , 2008, TCC.
[33] Rafael Pass,et al. Concurrent Nonmalleable Commitments , 2008, SIAM J. Comput..
[34] Yunlei Zhao,et al. Generic and Practical Resettable Zero-Knowledge in the Bare Public-Key Model , 2007, EUROCRYPT.
[35] Amit Sahai,et al. Concurrent Non-Malleable Zero Knowledge , 2006, 2006 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS'06).
[36] Amos Fiat,et al. Zero-knowledge proofs of identity , 1987, Journal of Cryptology.
[37] Rafael Pass,et al. Concurrent non-malleable commitments , 2005, 46th Annual IEEE Symposium on Foundations of Computer Science (FOCS'05).
[38] Rafael Pass,et al. New and improved constructions of non-malleable cryptographic protocols , 2005, STOC '05.
[39] Giovanni Di Crescenzo,et al. Constant-Round Resettable Zero Knowledge with Concurrent Soundness in the Bare Public-Key Model , 2004, CRYPTO.
[40] Rafail Ostrovsky,et al. Round-Optimal Secure Two-Party Computation , 2004, CRYPTO.
[41] Rafael Pass,et al. Bounded-concurrent secure multi-party computation with a dishonest majority , 2004, STOC '04.
[42] Moni Naor,et al. Bit commitment using pseudorandomness , 1989, Journal of Cryptology.
[43] Ivan Damgård,et al. Non-interactive and reusable non-malleable commitment schemes , 2003, STOC '03.
[44] Rafael Pass,et al. Simulation in Quasi-Polynomial Time, and Its Application to Protocol Composition , 2003, EUROCRYPT.
[45] Boaz Barak,et al. Constant-round coin-tossing with a man in the middle or realizing the shared random string model , 2002, The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings..
[46] Jonathan Katz,et al. Efficient cryptographic protocols preventing man-in-the-middle attacks , 2002 .
[47] Silvio Micali,et al. Soundness in the Public-Key Model , 2001, CRYPTO.
[48] Marc Fischlin,et al. Identification Protocols Secure against Reset Attacks , 2001, EUROCRYPT.
[49] Ran Canetti,et al. Black-Box Concurrent Zero-Knowledge Requires ~Omega(log n) Rounds , 2001, Electron. Colloquium Comput. Complex..
[50] Ran Canetti,et al. Resettable zero-knowledge (extended abstract) , 2000, STOC '00.
[51] Silvio Micali,et al. Practical and Provably-Secure Commitment Schemes from Collision-Free Hashing , 1996, CRYPTO.
[52] Ivan Damgård,et al. Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols , 1994, CRYPTO.
[53] Mihir Bellare,et al. Entity Authentication and Key Distribution , 1993, CRYPTO.
[54] Torben P. Pedersen. Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing , 1991, CRYPTO.
[55] Moni Naor,et al. Non-malleable cryptography , 1991, STOC '91.
[56] Moni Naor,et al. Non-Malleable Cryptography (Extended Abstract) , 1991, STOC 1991.
[57] Adi Shamir,et al. Publicly Verifiable Non-Interactive Zero-Knowledge Proofs , 1990, CRYPTO.
[58] Moni Naor,et al. Universal one-way hash functions and their cryptographic applications , 1989, STOC '89.
[59] Leonid A. Levin,et al. A hard-core predicate for all one-way functions , 1989, STOC '89.
[60] A. Shamir,et al. Zero knowledge proofs of identity , 1987, STOC.
[61] Joseph Gaer. The first round , 1944 .