Sciweavers

PKC
2016
Springer
104views Cryptology» more  PKC 2016»
8 years 19 days ago
Non-Malleable Functions and Their Applications
We formally study “non-malleable functions” (NMFs), a general cryptographic primitive which simplifies and relaxes “non-malleable one-way/hash functions” (NMOWHFs) introd...
Yu Chen, Baodong Qin, Jiang Zhang, Yi Deng, Sherma...
PKC
2016
Springer
79views Cryptology» more  PKC 2016»
8 years 19 days ago
Universally Composable Authentication and Key-Exchange with Global PKI
Message authentication and key exchange are two of the most basic tasks of cryptography. Solutions based on public-key infrastructure (PKI) are prevalent. Still, the state of the ...
Ran Canetti, Daniel Shahaf, Margarita Vald
PKC
2016
Springer
76views Cryptology» more  PKC 2016»
8 years 19 days ago
Asynchronous Secure Multiparty Computation in Constant Time
In the setting of secure multiparty computation, a set of mutually distrusting parties wish to securely compute a joint function. It is well known that if the communication model ...
Ran Cohen
PKC
2016
Springer
73views Cryptology» more  PKC 2016»
8 years 19 days ago
Robust Secret Sharing Schemes Against Local Adversaries
Allison Bishop, Valerio Pastro
PKC
2016
Springer
71views Cryptology» more  PKC 2016»
8 years 19 days ago
Adaptively Secure Multi-Party Computation from LWE (via Equivocal FHE)
Adaptively secure Multi-Party Computation (MPC) is an essential and fundamental notion in cryptography. In this work, we construct Universally Composable (UC) MPC protocols that ar...
Ivan Damgård, Antigoni Polychroniadou, Vanis...
Cryptology
Top of PageReset Settings