Von Ahn, Hopper and Langford introduced the notion of steganographic a.k.a. covert computation, to capture distributed computation where the attackers must not be able to distinguish honest parties from entities emitting random bitstrings. This indistinguishability should hold for the duration of the computation except for what is revealed by the intended outputs of the computed functionality. An important case of covert computation is mutually authenticated key exchange, a.k.a. mutual authentication. Mutual authentication is a fundamental primitive often preceding more complex secure protocols used for distributed computation. However, standard authentication implementations are not covert, which allows a network adversary to target or blo...
Recently, Aumann and Lindell introduced a new realistic security model for secure compu-tation, name...
The covert security model (Aumann and Lindell, TCC 2007) offers an important security/efficiency tra...
We initiate the study of broadcast steganography (BS), an extension of steganography to the multi-re...
Introduced by von Ahn et al. (STOC’05), covert two-party computation is an appealing cryptographic p...
In the context of secure computation, protocols with security against covert adversaries ensure that...
We introduce the notion of covert security with public verifiability, building on the covert securit...
We introduce covert two-party computation, a stronger notion of security than standard secure twopar...
Following the line of work presented recently by Bellare, Paterson and Rogaway, we formalize and inv...
Multiparty computation protocols (MPC) are said to be secure against covert adversaries if the hones...
We introduce an extension of covert two-party computation (as introducted by von Ahn, Hopper, Langfo...
The keys which are generated by cryptography algorithms have still been compromised by attackers. So...
In many practical settings, participants are willing to deviate from the protocol only if they remai...
We present the first information-theoretic steganographic protocol with an asymptotically optimal ra...
Protocols with \emph{publicly verifiable covert (PVC) security} offer high efficiency and an appeali...
Abstract. In the setting of secure multiparty computation, a set of mu-tually distrustful parties wi...
Recently, Aumann and Lindell introduced a new realistic security model for secure compu-tation, name...
The covert security model (Aumann and Lindell, TCC 2007) offers an important security/efficiency tra...
We initiate the study of broadcast steganography (BS), an extension of steganography to the multi-re...
Introduced by von Ahn et al. (STOC’05), covert two-party computation is an appealing cryptographic p...
In the context of secure computation, protocols with security against covert adversaries ensure that...
We introduce the notion of covert security with public verifiability, building on the covert securit...
We introduce covert two-party computation, a stronger notion of security than standard secure twopar...
Following the line of work presented recently by Bellare, Paterson and Rogaway, we formalize and inv...
Multiparty computation protocols (MPC) are said to be secure against covert adversaries if the hones...
We introduce an extension of covert two-party computation (as introducted by von Ahn, Hopper, Langfo...
The keys which are generated by cryptography algorithms have still been compromised by attackers. So...
In many practical settings, participants are willing to deviate from the protocol only if they remai...
We present the first information-theoretic steganographic protocol with an asymptotically optimal ra...
Protocols with \emph{publicly verifiable covert (PVC) security} offer high efficiency and an appeali...
Abstract. In the setting of secure multiparty computation, a set of mu-tually distrustful parties wi...
Recently, Aumann and Lindell introduced a new realistic security model for secure compu-tation, name...
The covert security model (Aumann and Lindell, TCC 2007) offers an important security/efficiency tra...
We initiate the study of broadcast steganography (BS), an extension of steganography to the multi-re...