We show that the security of some well-known cryptographic protocols, primitives and as-sumptions (e.g., the Schnorr identification scheme, commitments secure under adaptive selective-decommitment, the “one-more ” discrete logarithm assumption) cannot be based on any standard assumption using a Turing (i.e., black-box) reduction. These results follow from a general result showing that Turing reductions cannot be used to prove security of constant-round sequentially witness-hiding special-sound protocols for unique witness relations, based on standard assump-tions; we emphasize that this result holds even if the protocol makes non-black-box use of the underlying assumption
We consider the problem of verifying the security of finitely many sessions of a protocol that toss...
For various well-known proofs of knowledge, we address the problem of how much information a cheatin...
The main aim of cryptography is to provide the frameworks and solutions for information security. Th...
We show that the security of some well-known cryptographic protocols, primitives and as-sumptions (e...
We show that the security of some well-known cryptographic protocols, primitives and assumptions (e...
222 pagesIn this work, we examine the science of proving formal security of primitives in cryptograp...
In this paper, we study the question of whether or not it is possible to construct protocols for gen...
The mission of theoretical cryptography is to dene and construct provably secure cryptographic proto...
It is well known that the secure computation of non-trivial functionalities in the setting of no hon...
Secure computation is one of the most fundamental cryptographic tasks. It is known that all function...
Zero-Knowledge Protocols and Witness Encryption are usually defined for NP relations. I show that th...
Secure computation is one of the most fundamental cryptographic tasks. It is known that all function...
The seminal result of Impagliazzo and Rudich (STOC 1989) gave a black-box separation between one-way...
In cryptographic protocols, honest parties would prefer that their security is assured even in prese...
The provable security paradigm is an important tool to show security of cryptographic primitives. He...
We consider the problem of verifying the security of finitely many sessions of a protocol that toss...
For various well-known proofs of knowledge, we address the problem of how much information a cheatin...
The main aim of cryptography is to provide the frameworks and solutions for information security. Th...
We show that the security of some well-known cryptographic protocols, primitives and as-sumptions (e...
We show that the security of some well-known cryptographic protocols, primitives and assumptions (e...
222 pagesIn this work, we examine the science of proving formal security of primitives in cryptograp...
In this paper, we study the question of whether or not it is possible to construct protocols for gen...
The mission of theoretical cryptography is to dene and construct provably secure cryptographic proto...
It is well known that the secure computation of non-trivial functionalities in the setting of no hon...
Secure computation is one of the most fundamental cryptographic tasks. It is known that all function...
Zero-Knowledge Protocols and Witness Encryption are usually defined for NP relations. I show that th...
Secure computation is one of the most fundamental cryptographic tasks. It is known that all function...
The seminal result of Impagliazzo and Rudich (STOC 1989) gave a black-box separation between one-way...
In cryptographic protocols, honest parties would prefer that their security is assured even in prese...
The provable security paradigm is an important tool to show security of cryptographic primitives. He...
We consider the problem of verifying the security of finitely many sessions of a protocol that toss...
For various well-known proofs of knowledge, we address the problem of how much information a cheatin...
The main aim of cryptography is to provide the frameworks and solutions for information security. Th...