On Invertible Sampling and Adaptive Security
暂无分享,去创建一个
Yuval Ishai | Amit Sahai | Claudio Orlandi | Abishek Kumarasubramanian | A. Sahai | Y. Ishai | Claudio Orlandi | Abishek Kumarasubramanian
[1] Ran Canetti,et al. Security and Composition of Multiparty Cryptographic Protocols , 2000, Journal of Cryptology.
[2] Moni Naor. Advances in Cryptology - EUROCRYPT 2007, 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, Proceedings , 2007, EUROCRYPT.
[3] Matthew Franklin,et al. Advances in Cryptology – CRYPTO 2004 , 2004, Lecture Notes in Computer Science.
[4] Cynthia Dwork,et al. Advances in Cryptology – CRYPTO 2020: 40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020, Proceedings, Part III , 2020, Annual International Cryptology Conference.
[5] Tal Malkin,et al. Simple, Black-Box Constructions of Adaptively Secure Protocols , 2009, TCC.
[6] Nigel P. Smart,et al. Advances in Cryptology - EUROCRYPT 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings , 2008, EUROCRYPT.
[7] A. Yao,et al. Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.
[8] Ivan Damgård,et al. Improved Non-committing Encryption Schemes Based on a General Complexity Assumption , 2000, Annual International Cryptology Conference.
[9] Ran Canetti,et al. Extractable Perfectly One-Way Functions , 2008, ICALP.
[10] Rainer A. Rueppel. Advances in Cryptology — EUROCRYPT’ 92 , 2001, Lecture Notes in Computer Science.
[11] Amit Sahai,et al. Efficient Non-interactive Proof Systems for Bilinear Groups , 2008, EUROCRYPT.
[12] Avi Wigderson,et al. Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.
[13] Oded Goldreich,et al. A randomized protocol for signing contracts , 1985, CACM.
[14] Russell Impagliazzo,et al. One-way functions are essential for complexity based cryptography , 1989, 30th Annual Symposium on Foundations of Computer Science.
[15] Hoeteck Wee. On pseudoentropy versus compressibility , 2004, Proceedings. 19th IEEE Annual Conference on Computational Complexity, 2004..
[16] Burton S. Kaliski. Advances in Cryptology - CRYPTO '97 , 1997 .
[17] Donald Beaver,et al. Cryptographic Protocols Provably Secure Against Dynamic Adversaries , 1992, EUROCRYPT.
[18] Salil P. Vadhan,et al. Derandomization in Cryptography , 2007, SIAM J. Comput..
[19] Robin Milner,et al. On Observing Nondeterminism and Concurrency , 1980, ICALP.
[20] Andrew Y. Lindell. Adaptively Secure Two-Party Computation with Erasures , 2009, CT-RSA.
[21] Donald Beaver,et al. Plug and Play Encryption , 1997, CRYPTO.
[22] Ivan Damgård,et al. Towards Practical Public Key Systems Secure Against Chosen Ciphertext Attacks , 1991, CRYPTO.
[23] Ramzi Ronny Dakdouk. Theory and application of extractable functions , 2009 .
[24] Rafail Ostrovsky,et al. Non-interactive Zaps and New Techniques for NIZK , 2006, CRYPTO.
[25] Martijn Stam. Beyond Uniformity: Better Security/Efficiency Tradeoffs for Compression Functions , 2008, CRYPTO.
[26] Mihir Bellare,et al. The Knowledge-of-Exponent Assumptions and 3-Round Zero-Knowledge Protocols , 2004, CRYPTO.
[27] David Chaum,et al. Multiparty Unconditionally Secure Protocols (Extended Abstract) , 1988, STOC.
[28] Yuval Ishai,et al. Adaptive versus Non-Adaptive Security of Multi-Party Protocols , 2004, Journal of Cryptology.
[29] Moni Naor,et al. Evaluation may be easier than generation (extended abstract) , 1996, STOC '96.
[30] Ivan Damgård,et al. On the Necessary and Sufficient Assumptions for UC Computation , 2010, TCC.
[31] Dan Boneh,et al. Advances in Cryptology - CRYPTO 2003 , 2003, Lecture Notes in Computer Science.
[32] Silvio Micali,et al. Non-Interactive Zero-Knowledge Proof Systems , 1987, CRYPTO.
[33] Toshiaki Tanaka,et al. A Relationship between One-Wayness and Correlation Intractability , 1999, Public Key Cryptography.
[34] Moni Naor,et al. Zaps and their applications , 2000, Proceedings 41st Annual Symposium on Foundations of Computer Science.
[35] Tal Malkin,et al. Improved Non-committing Encryption with Applications to Adaptively Secure Protocols , 2009, ASIACRYPT.
[36] Joe Kilian,et al. Founding crytpography on oblivious transfer , 1988, STOC '88.
[37] Joan Feigenbaum,et al. Advances in Cryptology-Crypto 91 , 1992 .
[38] Ran Canetti,et al. Universally composable security: a new paradigm for cryptographic protocols , 2001, Proceedings 2001 IEEE International Conference on Cluster Computing.
[39] Arto Salomaa,et al. Public-Key Cryptography , 1991, EATCS Monographs on Theoretical Computer Science.
[40] Moni Naor,et al. On Cryptographic Assumptions and Challenges , 2003, CRYPTO.
[41] Sampath Kannan,et al. The relationship between public key encryption and oblivious transfer , 2000, Proceedings 41st Annual Symposium on Foundations of Computer Science.
[42] Moni Naor,et al. Adaptively secure multi-party computation , 1996, STOC '96.
[43] Benny Pinkas,et al. Secure Two-Party Computation is Practical , 2009, IACR Cryptol. ePrint Arch..
[44] Carl Pomerance,et al. Advances in Cryptology — CRYPTO ’87 , 2000, Lecture Notes in Computer Science.
[45] Manuel Blum,et al. Noninteractive Zero-Knowledge , 1991, SIAM J. Comput..
[46] Yehuda Lindell,et al. Universally composable two-party and multi-party secure computation , 2002, STOC '02.
[47] Manoj Prabhakaran,et al. Statistically Hiding Sets , 2009, CT-RSA.
[48] Marc Fischlin,et al. Topics in Cryptology – CT-RSA 2009 , 2009 .
[49] Ran Canetti,et al. Towards a Theory of Extractable Functions , 2009, TCC.
[50] Chi-Jen Lu,et al. Conditional Computational Entropy, or Toward Separating Pseudoentropy from Compressibility , 2007, EUROCRYPT.
[51] Daniel Wichs,et al. Somewhat Non-Committing Encryption and Efficient Adaptively Secure Oblivious Transfer , 2009, IACR Cryptol. ePrint Arch..
[52] Mihir Bellare. Advances in Cryptology — CRYPTO 2000 , 2000, Lecture Notes in Computer Science.
[53] Adi Shamir,et al. Multiple non-interactive zero knowledge proofs based on a single random string , 1990, Proceedings [1990] 31st Annual Symposium on Foundations of Computer Science.
[54] Manuel Blum,et al. Non-Interactive Zero-Knowledge and Its Applications (Extended Abstract) , 1988, STOC 1988.
[55] Yuval Ishai,et al. Founding Cryptography on Oblivious Transfer - Efficiently , 2008, CRYPTO.