Sciweavers

325 search results - page 1 / 65
» Concurrent Composition of Secure Protocols in the Timing Mod...
Sort
View
123
Voted
JOC
2007
84views more  JOC 2007»
15 years 9 days ago
Concurrent Composition of Secure Protocols in the Timing Model
In the setting of secure multiparty computation, a set of mutually distrustful parties wish to securely compute some joint function of their inputs. In the stand-alone case, it ha...
Yael Tauman Kalai, Yehuda Lindell, Manoj Prabhakar...
99
Voted
STOC
2005
ACM
132views Algorithms» more  STOC 2005»
16 years 22 days ago
Concurrent general composition of secure protocols in the timing model
In the setting of secure multiparty computation, a set of parties wish to to jointly compute some function of their input (i.e., they wish to securely carry out some distributed t...
Yael Tauman Kalai, Yehuda Lindell, Manoj Prabhakar...
111
Voted
JOC
2008
86views more  JOC 2008»
15 years 12 days ago
Lower Bounds and Impossibility Results for Concurrent Self Composition
In the setting of concurrent self composition, a single protocol is executed many times concurrently by a single set of parties. In this paper, we prove lower bounds and impossibi...
Yehuda Lindell
132
Voted
EUROCRYPT
2011
Springer
14 years 3 months ago
Concurrent Composition in the Bounded Quantum Storage Model
We define the BQS-UC model, a variant of the UC model, that deals with protocols in the bounded quantum storage model. We present a statistically secure commitment protocol in th...
Dominique Unruh
CRYPTO
2012
Springer
247views Cryptology» more  CRYPTO 2012»
13 years 2 months ago
Black-Box Constructions of Composable Protocols without Set-Up
Abstract. We present the first black-box construction of a secure multiparty computation protocol that satisfies a meaningful notion of concurrent security in the plain model (wi...
Huijia Lin, Rafael Pass