Taming Adaptivity in YOSO Protocols: The Modular Way
Abstract
References
Index Terms
- Taming Adaptivity in YOSO Protocols: The Modular Way
Recommendations
(Public) Verifiability for Composable Protocols Without Adaptivity or Zero-Knowledge
Provable and Practical SecurityAbstractThe Universal Composability (UC) framework (FOCS ’01) is the current standard for proving security of cryptographic protocols under composition. It allows to reason about complex protocol structures in a bottom-up fashion: any building block that ...
Black-Box Constructions of Two-Party Protocols from One-Way Functions
TCC '09: Proceedings of the 6th Theory of Cryptography Conference on Theory of CryptographyWe exhibit constructions of the following two-party cryptographic protocols given only black-box access to a one-way function:
- constant-round zero-knowledge arguments (of knowledge) for any language in NP;
- constant-round trapdoor commitment schemes;
- ...
YOLO YOSO: Fast and Simple Encryption and Secret Sharing in the YOSO Model
Advances in Cryptology – ASIACRYPT 2022AbstractAchieving adaptive (or proactive) security in cryptographic protocols is notoriously difficult due to the adversary’s power to dynamically corrupt parties as the execution progresses. Inspired by the work of Benhamouda et al. in TCC 2020, Gentry ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
Publisher
Springer-Verlag
Berlin, Heidelberg
Publication History
Qualifiers
- Article
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 0Total Downloads
- Downloads (Last 12 months)0
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
View options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in