Abstract. In the setting of secure computation, a set of parties wish to securely compute some function of their inputs, in the presence of an adversary. The adversary in question may be static (meaning that it con-trols a predetermined subset of the parties) or adaptive (meaning that it can choose to corrupt parties during the protocol execution and based on what it sees). In this paper, we study two fundamental questions relating to the basic zero-knowledge and oblivious transfer protocol problems: – Adaptive zero-knowledge proofs: We ask whether it is possible to con-struct adaptive zero-knowledge proofs (with unconditional sound-ness). Beaver (STOC 1996) showed that known zero-knowledge proofs are not adaptively secure, and in addition ...
We consider oblivious transfer protocols and their applications that use underneath semantically sec...
In [TCC 2009 and JoC 2011] Lindell and Zarosim defined adaptive-corruption zero knowledge giving to ...
In [TCC 2009 and JoC 2011] Lindell and Zarosim defined adaptive-corruption zero knowledge giving to ...
In the setting of secure computation, a set of parties wish to securely compute some function of the...
Zero-knowledge (ZK) protocols are undoubtedly among the central primitives in cryptography, lending ...
Zero-knowledge (ZK) protocols are undoubtedly among the central primitives in cryptography, lending ...
Adaptive security is a strong security notion that captures additional security threats that are not...
Adaptive security is a strong security notion that captures additional security threats that are not...
International audienceWe show how to build a UC-Secure Oblivious Transfer in the presence of Adaptiv...
International audienceWe show how to build a UC-Secure Oblivious Transfer in the presence of Adaptiv...
International audienceWe show how to build a UC-Secure Oblivious Transfer in the presence of Adaptiv...
A fundamental problem in designing secure multi-party protocols is how to deal with adaptive ad-vers...
Abstract. An important problem in secure multi-party computation is the design of protocols that can...
International audienceAn important problem in secure multi-party computation is the design of protoc...
ABSTRACT We present a general construction of a zero-knowledge proof for an NP relation R(x, w) whic...
We consider oblivious transfer protocols and their applications that use underneath semantically sec...
In [TCC 2009 and JoC 2011] Lindell and Zarosim defined adaptive-corruption zero knowledge giving to ...
In [TCC 2009 and JoC 2011] Lindell and Zarosim defined adaptive-corruption zero knowledge giving to ...
In the setting of secure computation, a set of parties wish to securely compute some function of the...
Zero-knowledge (ZK) protocols are undoubtedly among the central primitives in cryptography, lending ...
Zero-knowledge (ZK) protocols are undoubtedly among the central primitives in cryptography, lending ...
Adaptive security is a strong security notion that captures additional security threats that are not...
Adaptive security is a strong security notion that captures additional security threats that are not...
International audienceWe show how to build a UC-Secure Oblivious Transfer in the presence of Adaptiv...
International audienceWe show how to build a UC-Secure Oblivious Transfer in the presence of Adaptiv...
International audienceWe show how to build a UC-Secure Oblivious Transfer in the presence of Adaptiv...
A fundamental problem in designing secure multi-party protocols is how to deal with adaptive ad-vers...
Abstract. An important problem in secure multi-party computation is the design of protocols that can...
International audienceAn important problem in secure multi-party computation is the design of protoc...
ABSTRACT We present a general construction of a zero-knowledge proof for an NP relation R(x, w) whic...
We consider oblivious transfer protocols and their applications that use underneath semantically sec...
In [TCC 2009 and JoC 2011] Lindell and Zarosim defined adaptive-corruption zero knowledge giving to ...
In [TCC 2009 and JoC 2011] Lindell and Zarosim defined adaptive-corruption zero knowledge giving to ...