-
1
-
-
67650685947
-
Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening
-
Joux, A. (ed.) EUROCRYPT 2009. Springer, Heidelberg
-
Bellare, M., Hofheinz, D., Yilek, S.: Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 1-35. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5479
, pp. 1-35
-
-
Bellare, M.1
Hofheinz, D.2
Yilek, S.3
-
2
-
-
84859985296
-
Standard Security Does Not Imply Security against Selective-Opening
-
Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. Springer, Heidelberg
-
Bellare, M., Dowsley, R., Waters, B., Yilek, S.: Standard Security Does Not Imply Security against Selective-Opening. In: Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. LNCS, vol. 7237, pp. 645-662. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7237
, pp. 645-662
-
-
Bellare, M.1
Dowsley, R.2
Waters, B.3
Yilek, S.4
-
3
-
-
84952324553
-
On definitions of selective opening security
-
ePrint Archive 678
-
Böhl, F., Hofheinz, D., Kraschewski, D.: On definitions of selective opening security. IACR Cryptology ePrint Archive 678 (2011)
-
(2011)
IACR Cryptology
-
-
Böhl, F.1
Hofheinz, D.2
Kraschewski, D.3
-
4
-
-
0029723583
-
Adaptively secure multi-party computation
-
ACM Press May
-
Canetti, R., Feige, U., Goldreich, O., Naor, M.: Adaptively secure multi-party computation. In: 28th Annual ACM Symposium on Theory of Computing, pp. 639-648. ACM Press (May 1996)
-
(1996)
28th Annual ACM Symposium on Theory of Computing
, pp. 639-648
-
-
Canetti, R.1
Feige, U.2
Goldreich, O.3
Naor, M.4
-
5
-
-
84958626761
-
Deniable Encryption
-
Kaliski Jr., B.S. (ed.) CRYPTO 1997. Springer, Heidelberg
-
Canetti, R., Dwork, C., Naor, M., Ostrovsky, R.: Deniable Encryption. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 90-104. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1294
, pp. 90-104
-
-
Canetti, R.1
Dwork, C.2
Naor, M.3
Ostrovsky, R.4
-
6
-
-
84937437506
-
Perfect Hiding and Perfect Binding Universally Composable Commitment Schemes with Constant Expansion Factor
-
Yung, M. (ed.) CRYPTO 2002. Springer, Heidelberg
-
Damgård, I., Nielsen, J.B.: Perfect Hiding and Perfect Binding Universally Composable Commitment Schemes with Constant Expansion Factor. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 581-596. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2442
, pp. 581-596
-
-
Damgård, I.1
Nielsen, J.B.2
-
7
-
-
33745545274
-
On the existence of statistically hiding bit commitment schemes and fail-stop signatures
-
Damgård, I., Pedersen, T.P., Pfitzmann, B.: On the existence of statistically hiding bit commitment schemes and fail-stop signatures. Journal of Cryptology 10(3), 163-194 (1997)
-
(1997)
Journal of Cryptology
, vol.10
, Issue.3
, pp. 163-194
-
-
Damgård, I.1
Pedersen, T.P.2
Pfitzmann, B.3
-
8
-
-
0033332890
-
Magic functions
-
IEEE Computer Society Press October
-
Dwork, C., Naor, M., Reingold, O., Stockmeyer, L.J.: Magic functions. In: 40th Annual Symposium on Foundations of Computer Science, pp. 523-534. IEEE Computer Society Press (October 1999)
-
(1999)
40th Annual Symposium on Foundations of Computer Science
, pp. 523-534
-
-
Dwork, C.1
Naor, M.2
Reingold, O.3
Stockmeyer, L.J.4
-
9
-
-
77954642903
-
Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks
-
Gilbert, H. (ed.) EUROCRYPT 2010. Springer, Heidelberg
-
Fehr, S., Hofheinz, D., Kiltz, E., Wee, H.: Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 381-402. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6110
, pp. 381-402
-
-
Fehr, S.1
Hofheinz, D.2
Kiltz, E.3
Wee, H.4
-
11
-
-
40249112675
-
Finding collisions in interactive protocols - A tight lower bound on the round complexity of statistically-hiding commitments
-
IEEE Computer Society Press October
-
Haitner, I., Hoch, J.J., Reingold, O., Segev, G.: Finding collisions in interactive protocols - a tight lower bound on the round complexity of statistically-hiding commitments. In: 48th Annual Symposium on Foundations of Computer Science, pp. 669-679. IEEE Computer Society Press (October 2007)
-
(2007)
48th Annual Symposium on Foundations of Computer Science
, pp. 669-679
-
-
Haitner, I.1
Hoch, J.J.2
Reingold, O.3
Segev, G.4
-
12
-
-
77954636265
-
Statistically hiding commitments and statistical zero-knowledge arguments from any one-way function
-
Haitner, I., Nguyen, M.-H., Ong, S.J., Reingold, O., Vadhan, S.P.: Statistically hiding commitments and statistical zero-knowledge arguments from any one-way function. SIAM J. Comput. 39(3), 1153-1218 (2009)
-
(2009)
SIAM J. Comput.
, vol.39
, Issue.3
, pp. 1153-1218
-
-
Haitner, I.1
Nguyen, M.-H.2
Ong, S.J.3
Reingold, O.4
Vadhan, S.P.5
-
13
-
-
82955177043
-
Lossy Encryption: Constructions from General Assumptions and Efficient Selective Opening Chosen Ciphertext Security
-
Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. Springer, Heidelberg
-
Hemenway, B., Libert, B., Ostrovsky, R., Vergnaud, D.: Lossy Encryption: Constructions from General Assumptions and Efficient Selective Opening Chosen Ciphertext Security. In: Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. LNCS, vol. 7073, pp. 70-88. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.7073
, pp. 70-88
-
-
Hemenway, B.1
Libert, B.2
Ostrovsky, R.3
Vergnaud, D.4
-
14
-
-
84860009205
-
All-But-Many Lossy Trapdoor Functions
-
Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. Springer, Heidelberg
-
Hofheinz, D.: All-But-Many Lossy Trapdoor Functions. In: Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. LNCS, vol. 7237, pp. 209-227. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7237
, pp. 209-227
-
-
Hofheinz, D.1
-
15
-
-
0024867751
-
Universal one-way hash functions and their cryptographic applications
-
ACM Press May
-
Naor, M., Yung, M.: Universal one-way hash functions and their cryptographic applications. In: 21st Annual ACM Symposium on Theory of Computing, pp. 33-43. ACM Press (May 1989)
-
(1989)
21st Annual ACM Symposium on Theory of Computing
, pp. 33-43
-
-
Naor, M.1
Yung, M.2
-
16
-
-
84982943258
-
Non-interactive and Information-Theoretic Secure Verifiable Secret Sharing
-
Feigenbaum, J. (ed.) CRYPTO 1991. Springer, Heidelberg
-
Pedersen, T.P.: Non-interactive and Information-Theoretic Secure Verifiable Secret Sharing. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 129-140. Springer, Heidelberg (1992)
-
(1992)
LNCS
, vol.576
, pp. 129-140
-
-
Pedersen, T.P.1
-
17
-
-
51849126892
-
A Framework for Efficient and Composable Oblivious Transfer
-
Wagner, D. (ed.) CRYPTO 2008. Springer, Heidelberg
-
Peikert, C., Vaikuntanathan, V., Waters, B.: A Framework for Efficient and Composable Oblivious Transfer. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 554-571. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5157
, pp. 554-571
-
-
Peikert, C.1
Vaikuntanathan, V.2
Waters, B.3
|