On Input Indistinguishable Proof Systems
暂无分享,去创建一个
[1] Rafail Ostrovsky,et al. Impossibility Results for Static Input Secure Computation , 2012, IACR Cryptol. ePrint Arch..
[2] Moni Naor,et al. Concurrent zero-knowledge , 2004, JACM.
[3] Yehuda Lindell,et al. Lower Bounds for Concurrent Self Composition , 2004, TCC.
[4] Rafail Ostrovsky,et al. Concurrent Non-Malleable Witness Indistinguishability and its Applications , 2006, Electron. Colloquium Comput. Complex..
[5] Amit Sahai,et al. Concurrently Secure Computation in Constant Rounds , 2012, EUROCRYPT.
[6] Robin Milner,et al. On Observing Nondeterminism and Concurrency , 1980, ICALP.
[7] Zhenfu Cao,et al. On constant-round concurrent non-malleable proof systems , 2011, Inf. Process. Lett..
[8] Silvio Micali,et al. Input-Indistinguishable Computation , 2006, 2006 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS'06).
[9] Rafail Ostrovsky,et al. Constant-Round Concurrent Non-malleable Zero Knowledge in the Bare Public-Key Model , 2008, ICALP.
[10] Amit Sahai,et al. New Impossibility Results for Concurrent Composition and a Non-Interactive Completeness Theorem for Secure Computation , 2012, IACR Cryptol. ePrint Arch..
[11] Moni Naor,et al. Non-malleable cryptography , 1991, STOC '91.
[12] Adi Shamir,et al. Witness indistinguishable and witness hiding protocols , 1990, STOC '90.
[13] Yehuda Lindell,et al. More Efficient Constant-Round Multi-Party Computation from BMR and SHE , 2016, IACR Cryptol. ePrint Arch..
[14] Silvio Micali,et al. The knowledge complexity of interactive proof-systems , 1985, STOC '85.
[15] Manuel Blum,et al. How to Prove a Theorem So No One Else Can Claim It , 2010 .
[16] Moni Naor,et al. Zaps and Their Applications , 2007, SIAM J. Comput..
[17] Amit Sahai,et al. Concurrent Non-Malleable Zero Knowledge , 2006, 2006 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS'06).
[18] Kenneth G. Paterson,et al. Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation , 2015, IACR Cryptol. ePrint Arch..
[19] Ran Canetti,et al. Advances in Cryptology – CRYPTO 2012 , 2012, Lecture Notes in Computer Science.