-
1
-
-
17744381610
-
Universally composable protocols with relaxed set-up assumptions
-
IEEE Computer Society, October
-
Boaz Barak, Ran Canetti, Jesper Buus Nielsen, and Rafael Pass. Universally composable protocols with relaxed set-up assumptions. In 45th Symposium on Foundations of Computer Science, Proceedings of FOCS 2004, 17-19 October 2004, Rome, Italy, pages 186-195. IEEE Computer Society, October 2004.
-
(2004)
45th Symposium on Foundations of Computer Science, Proceedings of FOCS 2004, 17-19 October 2004, Rome, Italy
, pp. 186-195
-
-
Barak, B.1
Canetti, R.2
Buus Nielsen, J.3
Pass, R.4
-
2
-
-
0000867507
-
-
Gilles Brassard, David Chaum, and Claude Crépeau. Minimum disclosure proofs of knowledge, 1988. JCSS, 37:156-189.
-
Gilles Brassard, David Chaum, and Claude Crépeau. Minimum disclosure proofs of knowledge, 1988. JCSS, 37:156-189.
-
-
-
-
3
-
-
38049051575
-
Defeating classical bit commitments with a quantum computer
-
preprint archive quant-ph/9806031, May
-
Gilles Brassard, Claude Crépeau, Dominic Mayers, and Louis Salvail. Defeating classical bit commitments with a quantum computer. Los Alamos preprint archive quant-ph/9806031, May 1999.
-
(1999)
Los Alamos
-
-
Brassard, G.1
Crépeau, C.2
Mayers, D.3
Salvail, L.4
-
4
-
-
33746383020
-
Oblivious transfer with a memory-bounded receiver
-
ACM Press
-
Christian Cachin, Claude Crépeau, and Julien Marcil. Oblivious transfer with a memory-bounded receiver. In 34th Annual ACM Symposium on Theory of Computing, Proceedings of STOC 2002, pages 493-502. ACM Press, 2002.
-
(2002)
34th Annual ACM Symposium on Theory of Computing, Proceedings of STOC 2002
, pp. 493-502
-
-
Cachin, C.1
Crépeau, C.2
Marcil, J.3
-
5
-
-
84958598231
-
Unconditional security against memory-bounded adversaries
-
Burton S. Kaliski Jr, editor, Advances in Cryptology, Proceedings of CRYPTO '97, of, Springer-Verlag
-
Christian Cachin and Ueli Maurer. Unconditional security against memory-bounded adversaries. In Burton S. Kaliski Jr., editor, Advances in Cryptology, Proceedings of CRYPTO '97, volume 1294 of Lecture Notes in Computer Science, pages 292-306. Springer-Verlag, 1997.
-
(1997)
Lecture Notes in Computer Science
, vol.1294
, pp. 292-306
-
-
Cachin, C.1
Maurer, U.2
-
8
-
-
38049009695
-
Universally composable security with global setup
-
These proceedings
-
Ran Canetti, Yevgeniy Dodis, Rafael Pass, and Shabsi Walfish. Universally composable security with global setup. These proceedings.
-
-
-
Canetti, R.1
Dodis, Y.2
Pass, R.3
Walfish, S.4
-
9
-
-
84880897758
-
Universally composable commitments
-
Joe Kilian, editor, Advances in Cryptology, Proceedings of CRYPTO '01, of, Springer-Verlag
-
Ran Canetti and Marc Fischlin. Universally composable commitments. In Joe Kilian, editor, Advances in Cryptology, Proceedings of CRYPTO '01, volume 2139 of Lecture Notes in Computer Science, pages 19-40. Springer-Verlag, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2139
, pp. 19-40
-
-
Canetti, R.1
Fischlin, M.2
-
10
-
-
0036038991
-
Universally composable two-party and multi-party secure computation
-
ACM Press, Extended abstract
-
Ran Canetti, Yehuda Lindell, Rafail Ostrovsky, and Amit Sahai. Universally composable two-party and multi-party secure computation. In 34th Annual ACM Symposium on Theory of Computing, Proceedings of STOC 2002, pages 494-503. ACM Press, 2002. Extended abstract.
-
(2002)
34th Annual ACM Symposium on Theory of Computing, Proceedings of STOC 2002
, pp. 494-503
-
-
Canetti, R.1
Lindell, Y.2
Ostrovsky, R.3
Sahai, A.4
-
11
-
-
84937437506
-
Perfect hiding and perfect binding universally composable commitment schemes with constant expansion factor
-
Moti Yung, editor, Advances in Cryptology, Proceedings of CRYPTO '02, of, Springer-Verlag
-
Ivan Damgárd and Jesper Buus Nielsen. Perfect hiding and perfect binding universally composable commitment schemes with constant expansion factor. In Moti Yung, editor, Advances in Cryptology, Proceedings of CRYPTO '02, volume 2442 of Lecture Notes in Computer Science, pages 581-596. Springer-Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2442
, pp. 581-596
-
-
Damgárd, I.1
Buus Nielsen, J.2
-
12
-
-
35048832981
-
On generating the initial key in the bounded-storage model
-
Christian Cachin and Jan Camenisch, editors, Advances in Cryptology, Proceedings of EUROCRYPT '04, of, Springer-Verlag
-
Stefan Dziembowski and Ueli Maurer. On generating the initial key in the bounded-storage model. In Christian Cachin and Jan Camenisch, editors, Advances in Cryptology, Proceedings of EUROCRYPT '04, volume 3027 of Lecture Notes in Computer Science, pages 126-137. Springer-Verlag, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3027
, pp. 126-137
-
-
Dziembowski, S.1
Maurer, U.2
-
13
-
-
0342733642
-
Multiple non-interactive zero knowledge proofs under general assumptions
-
Uriel Feige, Dror Lapidot, and Adi Shamir. Multiple non-interactive zero knowledge proofs under general assumptions. SIAM Journal on Computing, 29(1):1-28, 1999.
-
(1999)
SIAM Journal on Computing
, vol.29
, Issue.1
, pp. 1-28
-
-
Feige, U.1
Lapidot, D.2
Shamir, A.3
-
16
-
-
84976832950
-
Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems
-
Oded Goldreich, Silvio Micali, and Avi Wigderson. Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems. Journal of the ACM, 38(3):690-728, 1991.
-
(1991)
Journal of the ACM
, vol.38
, Issue.3
, pp. 690-728
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
19
-
-
38049062802
-
-
Jörn Müller-Quade and Dominique Unruh. Long-term security and universal composability, 2006. Full version of this paper, IACR ePrint 2006/422.
-
Jörn Müller-Quade and Dominique Unruh. Long-term security and universal composability, 2006. Full version of this paper, IACR ePrint 2006/422.
-
-
-
-
21
-
-
0141544069
-
Perfect zero-knowledge arguments for NP using any one-way permutation
-
March
-
Moni Naor, Rafail Ostrovsky, Ramarathnam Venkatesan, and Moti Yung. Perfect zero-knowledge arguments for NP using any one-way permutation. Journal of Cryptology, 11(2):87-108, March 1998.
-
(1998)
Journal of Cryptology
, vol.11
, Issue.2
, pp. 87-108
-
-
Naor, M.1
Ostrovsky, R.2
Venkatesan, R.3
Yung, M.4
-
23
-
-
38049043696
-
-
Gesetz über Rahmenbedingungen fur elektronische Signaturen. Bundesgesetzblatt I 2001, 876, May 2001.
-
Gesetz über Rahmenbedingungen fur elektronische Signaturen. Bundesgesetzblatt I 2001, 876, May 2001.
-
-
-
|