Sciweavers

34 search results - page 2 / 7
» tcc 2010
Sort
View
TCC
2010
Springer
133views Cryptology» more  TCC 2010»
13 years 2 months ago
On the Necessary and Sufficient Assumptions for UC Computation
Abstract. We study the necessary and sufficient assumptions for universally composable (UC) computation, both in terms of setup and computational assumptions. We look at the common...
Ivan Damgård, Jesper Buus Nielsen, Claudio O...
TCC
2010
Springer
141views Cryptology» more  TCC 2010»
13 years 2 months ago
Composition of Zero-Knowledge Proofs with Efficient Provers
We revisit the composability of different forms of zero-knowledge proofs when the honest prover strategy is restricted to be polynomial time (given an appropriate auxiliary input)...
Eleanor Birrell, Salil P. Vadhan
TCC
2010
Springer
121views Cryptology» more  TCC 2010»
13 years 2 months ago
An Efficient Parallel Repetition Theorem
Abstract. We present a general parallel-repetition theorem with an efficient reduction. As a corollary of this theorem we establish that parallel repetition reduces the soundness e...
Johan Håstad, Rafael Pass, Douglas Wikstr&ou...
TCC
2010
Springer
166views Cryptology» more  TCC 2010»
14 years 1 months ago
Public-Key Encryption Schemes with Auxiliary Inputs
We construct public-key cryptosystems that remain secure even when the adversary is given any computationally uninvertible function of the secret key as auxiliary input (even one t...
Yevgeniy Dodis, Shafi Goldwasser, Yael Tauman Kala...
TCC
2010
Springer
175views Cryptology» more  TCC 2010»
13 years 3 months ago
Obfuscation of Hyperplane Membership
Previous work on program obfuscation gives strong negative results for general-purpose obfuscators, and positive results for obfuscating simple functions such as equality testing (...
Ran Canetti, Guy N. Rothblum, Mayank Varia