Adaptive and Concurrent Secure Computation from New Adaptive, Non-malleable Commitments (English)
Free access
- New search for: Dachman-Soled, Dana
- New search for: Malkin, Tal
- New search for: Raykova, Mariana
- New search for: Venkitasubramaniam, Muthuramakrishnan
- New search for: Dachman-Soled, Dana
- New search for: Malkin, Tal
- New search for: Raykova, Mariana
- New search for: Venkitasubramaniam, Muthuramakrishnan
In:
Advances in Cryptology - ASIACRYPT 2013
5
;
316-336
;
2013
- Article/Chapter (Book) / Electronic Resource
-
Title:Adaptive and Concurrent Secure Computation from New Adaptive, Non-malleable Commitments
-
Contributors:Dachman-Soled, Dana ( author ) / Malkin, Tal ( author ) / Raykova, Mariana ( author ) / Venkitasubramaniam, Muthuramakrishnan ( author )
-
Published in:Advances in Cryptology - ASIACRYPT 2013 , 5 ; 316-336Lecture Notes in Computer Science ; 8269, 5 ; 316-336
-
Publisher:
- New search for: Springer Berlin Heidelberg
-
Place of publication:Berlin, Heidelberg
-
Publication date:2013-01-01
-
Size:21 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Shorter Quasi-Adaptive NIZK Proofs for Linear SubspacesJutla, Charanjit S. / Roy, Arnab et al. | 2013
- 21
-
Constant-Round Concurrent Zero Knowledge in the Bounded Player ModelGoyal, Vipul / Jain, Abhishek / Ostrovsky, Rafail / Richelson, Silas / Visconti, Ivan et al. | 2013
- 41
-
Succinct Non-Interactive Zero Knowledge Arguments from Span Programs and Linear Error-Correcting CodesLipmaa, Helger et al. | 2013
- 61
-
Families of Fast Elliptic Curves from ℚ-curvesSmith, Benjamin et al. | 2013
- 79
-
Four-Dimensional GLV via the Weil RestrictionGuillevic, Aurore / Ionica, Sorina et al. | 2013
- 97
-
Discrete Gaussian Leftover Hash Lemma over Infinite DomainsAgrawal, Shweta / Gentry, Craig / Halevi, Shai / Sahai, Amit et al. | 2013
- 117
-
New Insight into the Isomorphism of Polynomial Problem IP1S and Its Use in CryptographyMacario-Rat, Gilles / Plut, Jérôme / Gilbert, Henri et al. | 2013
- 134
-
Constructing Confidential Channels from Authenticated Channels—Public-Key Encryption RevisitedCoretti, Sandro / Maurer, Ueli / Tackmann, Björn et al. | 2013
- 154
-
Reset Indifferentiability and Its ConsequencesBaecher, Paul / Brzuska, Christina / Mittelbach, Arno et al. | 2013
- 174
-
Computational Fuzzy ExtractorsFuller, Benjamin / Meng, Xianrui / Reyzin, Leonid et al. | 2013
- 194
-
Efficient One-Way Secret-Key Agreement and Private Channel Coding via PolarizationRenes, Joseph M. / Renner, Renato / Sutter, David et al. | 2013
- 214
-
SPHF-Friendly Non-interactive CommitmentsAbdalla, Michel / Benhamouda, Fabrice / Blazy, Olivier / Chevalier, Céline / Pointcheval, David et al. | 2013
- 235
-
Self-Updatable Encryption: Time Constrained Access Control with Hidden Attributes and Better EfficiencyLee, Kwangsu / Choi, Seung Geol / Lee, Dong Hoon / Park, Jong Hwan / Yung, Moti et al. | 2013
- 255
-
Function-Private Subspace-Membership Encryption and Its ApplicationsBoneh, Dan / Raghunathan, Ananth / Segev, Gil et al. | 2013
- 276
-
Random Projections, Graph Sparsification, and Differential PrivacyUpadhyay, Jalaj et al. | 2013
- 296
-
Notions of Black-Box Reductions, RevisitedBaecher, Paul / Brzuska, Christina / Fischlin, Marc et al. | 2013
- 316
-
Adaptive and Concurrent Secure Computation from New Adaptive, Non-malleable CommitmentsDachman-Soled, Dana / Malkin, Tal / Raykova, Mariana / Venkitasubramaniam, Muthuramakrishnan et al. | 2013
- 337
-
Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES2Dinur, Itai / Dunkelman, Orr / Keller, Nathan / Shamir, Adi et al. | 2013
- 357
-
Key Difference Invariant Bias in Block CiphersBogdanov, Andrey / Boura, Christina / Rijmen, Vincent / Wang, Meiqin / Wen, Long / Zhao, Jingyuan et al. | 2013
- 377
-
Leaked-State-Forgery Attack against the Authenticated Encryption Algorithm ALEWu, Shengbao / Wu, Hongjun / Huang, Tao / Wang, Mingsheng / Wu, Wenling et al. | 2013
- 405
-
A Modular Framework for Building Variable-Input-Length Tweakable CiphersShrimpton, Thomas / Terashima, R. Seth et al. | 2013
- 424
-
Parallelizable and Authenticated Online CiphersAndreeva, Elena / Bogdanov, Andrey / Luykx, Atul / Mennink, Bart / Tischhauser, Elmar / Yasuda, Kan et al. | 2013
- 444
-
How to Construct an Ideal Cipher from a Small Set of Public PermutationsLampe, Rodolphe / Seurin, Yannick et al. | 2013
- 464
-
Generic Key Recovery Attack on Feistel SchemeIsobe, Takanori / Shibutani, Kyoji et al. | 2013
- 486
-
Does My Device Leak Information? An a priori Statistical Power Analysis of Leakage Detection TestsMather, Luke / Oswald, Elisabeth / Bandenburg, Joe / Wójcik, Marcin et al. | 2013
- 506
-
Behind the Scene of Side Channel AttacksLomné, Victor / Prouff, Emmanuel / Roche, Thomas et al. | 2013
- 526
-
SCARE of Secret Ciphers with SPN StructuresRivain, Matthieu / Roche, Thomas et al. | 2013