×

Found 42 Documents (Results 1–42)

Completeness theorems for adaptively secure broadcast. (English) Zbl 07799089

Handschuh, Helena (ed.) et al., Advances in cryptology – CRYPTO 2023. 43rd annual international cryptology conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 14081, 3-38 (2023).
MSC:  94A60 68P25 68M14
PDFBibTeX XMLCite
Full Text: DOI

Round-optimal and communication-efficient multiparty computation. (English) Zbl 1497.68210

Dunkelman, Orr (ed.) et al., Advances in cryptology – EUROCRYPT 2022. 41st annual international conference on the theory and applications of cryptographic techniques, Trondheim, Norway, May 30 – June 3, 2022. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13275, 65-95 (2022).
PDFBibTeX XMLCite
Full Text: DOI Link

On the (ir)replaceability of global setups, or how (not) to use a global ledger. (English) Zbl 1511.94047

Nissim, Kobbi (ed.) et al., Theory of cryptography. 19th international conference, TCC 2021, Raleigh, NC, USA, November 8–11, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13043, 626-657 (2021).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A rational protocol treatment of 51% attacks. (English) Zbl 1486.94080

Malkin, Tal (ed.) et al., Advances in cryptology – CRYPTO 2021. 41st annual international cryptology conference, CRYPTO 2021, virtual event, August 16–20, 2021. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 12827, 3-32 (2021).
MSC:  94A60 91B64
PDFBibTeX XMLCite
Full Text: DOI

Dynamic ad hoc clock synchronization. (English) Zbl 1479.94118

Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2021. 40th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, October 17–21, 2021. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 12698, 399-428 (2021).
MSC:  94A60 68P25 68M14
PDFBibTeX XMLCite
Full Text: DOI Link

Proof-of-reputation blockchain with Nakamoto fallback. (English) Zbl 1494.94048

Bhargavan, Karthikeyan (ed.) et al., Progress in cryptology – INDOCRYPT 2020. 21st international conference on cryptology in India, Bangalore, India, December 13–16, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12578, 16-38 (2020).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Universal composition with global subroutines: capturing global setup within plain UC. (English) Zbl 1485.94051

Pass, Rafael (ed.) et al., Theory of cryptography. 18th international conference, TCC 2020, Durham, NC, USA, November 16–19, 2020. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 12552, 1-30 (2020).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Broadcast-optimal two-round MPC. (English) Zbl 1492.94083

Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2020. 39th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, May 10–14, 2020. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12106, 828-858 (2020).
MSC:  94A60 94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI

Resource-restricted cryptography: revisiting MPC bounds in the proof-of-work era. (English) Zbl 1502.94034

Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2020. 39th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, May 10–14, 2020. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12106, 129-158 (2020).
Reviewer: Aaron Lye (Bremen)
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Public-key cryptography – PKC 2020. 23rd IACR international conference on practice and theory of public-key cryptography, Edinburgh, UK, May 4–7, 2020. Proceedings. Part II. (English) Zbl 1481.94004

Lecture Notes in Computer Science 12111. Cham: Springer (ISBN 978-3-030-45387-9/pbk; 978-3-030-45388-6/ebook). xix, 658 p. (2020).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

Public-key cryptography – PKC 2020. 23rd IACR international conference on practice and theory of public-key cryptography, Edinburgh, UK, May 4–7, 2020. Proceedings. Part I. (English) Zbl 1496.94004

Lecture Notes in Computer Science 12110. Cham: Springer (ISBN 978-3-030-45373-2/pbk; 978-3-030-45374-9/ebook). xxi, 684 p. (2020).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

Timed signatures and zero-knowledge proofs – timestamping in the blockchain era. (English) Zbl 07314290

Conti, Mauro (ed.) et al., Applied cryptography and network security. 18th international conference, ACNS 2020, Rome, Italy, October 19–22, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12146, 335-354 (2020).
MSC:  68M25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Secure two-party computation over unreliable channels. (English) Zbl 1517.94102

Catalano, Dario (ed.) et al., Security and cryptography for networks. 11th international conference, SCN 2018, Amalfi, Italy, September 5–7, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11035, 445-463 (2018).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI Link

But why does it work? A rational protocol design treatment of bitcoin. (English) Zbl 1423.94048

Nielsen, Jesper Buus (ed.) et al., Advances in cryptology – EUROCRYPT 2018. 37th annual international conference on the theory and applications of cryptographic techniques, Tel Aviv, Israel, April 29 – May 3, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 10821, 34-65 (2018).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Round-preserving parallel composition of probabilistic-termination cryptographic protocols. (English) Zbl 1441.68013

Chatzigiannakis, Ioannis (ed.) et al., 44th international colloquium on automata, languages, and programming, ICALP 2017, Warsaw, Poland July 10–14, 2017. Proceedings. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 80, Article 37, 15 p. (2017).
MSC:  68M14 94A60
PDFBibTeX XMLCite
Full Text: DOI

The price of low communication in secure multi-party computation. (English) Zbl 1407.94107

Katz, Jonathan (ed.) et al., Advances in cryptology – CRYPTO 2017. 37th annual international cryptology conference, Santa Barbara, CA, USA, August 20–24, 2017. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 10401, 420-446 (2017).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Bitcoin as a transaction ledger: a composable treatment. (English) Zbl 1407.94077

Katz, Jonathan (ed.) et al., Advances in cryptology – CRYPTO 2017. 37th annual international cryptology conference, Santa Barbara, CA, USA, August 20–24, 2017. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 10401, 324-356 (2017).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Provably secure virus detection: using the observer effect against malware. (English) Zbl 1388.68025

Chatzigiannakis, Ioannis (ed.) et al., 43rd international colloquium on automata, languages, and programming, ICALP 2016, Rome, Italy, July 12–15, 2016. Proceedings. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik (ISBN 978-3-95977-013-2). LIPIcs – Leibniz International Proceedings in Informatics 55, Article 32, 14 p. (2016).
MSC:  68N30 94A60
PDFBibTeX XMLCite
Full Text: DOI

Constant-round asynchronous multi-party computation based on one-way functions. (English) Zbl 1407.94098

Cheon, Jung Hee (ed.) et al., Advances in cryptology – ASIACRYPT 2016. 22nd international conference on the theory and application of cryptology and information security, Hanoi, Vietnam, December 4-8, 2016. Proceedings. Part II. Berlin: Springer. Lect. Notes Comput. Sci. 10032, 998-1021 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Probabilistic termination and composability of cryptographic protocols. (English) Zbl 1406.94040

Robshaw, Matthew (ed.) et al., Advances in cryptology – CRYPTO 2016. 36th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2016. Proceedings. Part III. Berlin: Springer (ISBN 978-3-662-53014-6/pbk; 978-3-662-53015-3/ebook). Lecture Notes in Computer Science 9816, 240-269 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Network-hiding communication and applications to multi-party protocols. (English) Zbl 1391.94759

Robshaw, Matthew (ed.) et al., Advances in cryptology – CRYPTO 2016. 36th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2016. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-53007-8/pbk; 978-3-662-53008-5/ebook). Lecture Notes in Computer Science 9815, 335-365 (2016).
MSC:  94A60 68Q05 68Q10 68M12
PDFBibTeX XMLCite
Full Text: DOI

Security and cryptography for networks. 10th international conference, SCN 2016, Amalfi, Italy, August 31 – September 2, 2016. Proceedings. (English) Zbl 1344.94004

Lecture Notes in Computer Science 9841. Cham: Springer (ISBN 978-3-319-44617-2/pbk; 978-3-319-44618-9/ebook). xix, 606 p. (2016).
PDFBibTeX XMLCite
Full Text: DOI

Fair and robust multi-party computation using a global transaction ledger. (English) Zbl 1371.94643

Fischlin, Marc (ed.) et al., Advances in cryptology – EUROCRYPT 2016. 35th annual international conference on the theory and applications of cryptographic techniques, Vienna, Austria, May 8–12, 2016. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-49895-8/pbk; 978-3-662-49896-5/ebook). Lecture Notes in Computer Science 9666, 705-734 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Fair distributed computation of reactive functions. (English) Zbl 1394.68036

Moses, Yoram (ed.), Distributed computing. 29th international symposium, DISC 2015, Tokyo, Japan, October 7–9, 2015. Proceedings. Berlin: Springer (ISBN 978-3-662-48652-8/pbk; 978-3-662-48653-5/ebook). Lecture Notes in Computer Science 9363, 497-512 (2015).
PDFBibTeX XMLCite
Full Text: DOI HAL

The hidden graph model: communication locality and optimal resiliency with adaptive faults. (English) Zbl 1365.68255

Proceedings of the 6th conference on innovations in theoretical computer science, ITCS’15, Rehovot, Israel, January 11–13, 2015. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-3333-7). 153-162 (2015).
MSC:  68Q05 68M12 68Q10 68R10 94A60
PDFBibTeX XMLCite
Full Text: DOI

How fair is your protocol? A utility-based approach to protocol optimality. (English) Zbl 1333.94035

Proceedings of the 2015 ACM symposium on principles of distributed computing, PODC ’15, Donostia-San Sebastián, Spain, July 21–23, 2015. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-3617-8). 281-290 (2015).
MSC:  94A60 68M14 68W15
PDFBibTeX XMLCite
Full Text: DOI

Incoercible multi-party computation and universally composable receipt-free voting. (English) Zbl 1352.94024

Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-47999-5/pbk; 978-3-662-48000-7/ebook). Lecture Notes in Computer Science 9216, 763-780 (2015).
MSC:  94A60 68P25 68M12
PDFBibTeX XMLCite
Full Text: DOI

Distributing the setup in universally composable multi-party computation. (English) Zbl 1321.68049

Proceedings of the 2014 ACM symposium on principles of distributed computing, PODC ’14, Paris, France, July 15–18, 2014. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-2944-6). 20-29 (2014).
PDFBibTeX XMLCite
Full Text: DOI

Efficient three-party computation from cut-and-choose. (English) Zbl 1335.94039

Garay, Juan A. (ed.) et al., Advances in cryptology – CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17–21, 2014. Proceedings, Part II. Berlin: Springer (ISBN 978-3-662-44380-4/pbk). Lecture Notes in Computer Science 8617, 513-530 (2014).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Secure multi-party computation with identifiable abort. (English) Zbl 1335.94053

Garay, Juan A. (ed.) et al., Advances in cryptology – CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17–21, 2014. Proceedings, Part II. Berlin: Springer (ISBN 978-3-662-44380-4/pbk). Lecture Notes in Computer Science 8617, 369-386 (2014).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Universally composable synchronous computation. (English) Zbl 1316.68051

Sahai, Amit (ed.), Theory of cryptography. 10th theory of cryptography conference, TCC 2013, Tokyo, Japan, March 3–6, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36593-5/pbk). Lecture Notes in Computer Science 7785, 477-498 (2013).
MSC:  68P25 68M12 94A60
PDFBibTeX XMLCite
Full Text: DOI

Feasibility and completeness of cryptographic tasks in the quantum world. (English) Zbl 1315.94070

Sahai, Amit (ed.), Theory of cryptography. 10th theory of cryptography conference, TCC 2013, Tokyo, Japan, March 3–6, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36593-5/pbk). Lecture Notes in Computer Science 7785, 281-296 (2013).
MSC:  94A60 81P94
PDFBibTeX XMLCite
Full Text: DOI

Byzantine agreement with a rational adversary. (English) Zbl 1367.68019

Czumaj, Artur (ed.) et al., Automata, languages, and programming. 39th international colloquium, ICALP 2012, Coventry, UK, July 9–13, 2012. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-31584-8/pbk). Lecture Notes in Computer Science 7392, 561-572 (2012).
MSC:  68M12 94A60
PDFBibTeX XMLCite
Full Text: DOI

Collusion-preserving computation. (English) Zbl 1294.94090

Safavi-Naini, Reihaneh (ed.) et al., Advances in cryptology – CRYPTO 2012. 32nd annual cryptology conference, Santa Barbara, CA, USA, August 19–23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32008-8/pbk). Lecture Notes in Computer Science 7417, 124-143 (2012).
PDFBibTeX XMLCite
Full Text: DOI

Player-centric Byzantine agreement. (English) Zbl 1332.68010

Aceto, Luca (ed.) et al., Automata, languages and programming. 38th international colloquium, ICALP 2011, Zurich, Switzerland, July 4–8, 2011. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-22005-0/pbk). Lecture Notes in Computer Science 6755, 281-292 (2011).
MSC:  68M12 68M14 94A62
PDFBibTeX XMLCite
Full Text: DOI

Adaptively secure broadcast. (English) Zbl 1280.94067

Gilbert, Henri (ed.), Advances in cryptology – EUROCRYPT 2010. 29th annual international conference on the theory and applications of cryptographic techniques, French Riviera, May 30 – June 3, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-13189-9/pbk). Lecture Notes in Computer Science 6110, 466-485 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Realistic failures in secure multi-party computation. (English) Zbl 1213.94146

Reingold, Omer (ed.), Theory of cryptography. 6th theory of cryptography conference, TCC 2009, San Francisco, CA, USA, March 15–17, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-00456-8/pbk). Lecture Notes in Computer Science 5444, 274-293 (2009).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

MPC vs. SFE: unconditional and computational security. (English) Zbl 1206.94073

Pieprzyk, Josef (ed.), Advances in cryptology – ASIACRYPT 2008. 14th international conference on the theory and application of cryptology and information security, Melbourne, Australia, December 7–11, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-89254-0/pbk). Lecture Notes in Computer Science 5350, 1-18 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

MPC vs. SFE: Perfect security in a unified corruption model. (English) Zbl 1162.94335

Canetti, Ran (ed.), Theory of cryptography. Fifth theory of cryptography conference, TCC 2008, New York, USA, March 19–21, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-78524-8/pbk). Lecture Notes in Computer Science 4948, 231-250 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

all top 5

Year of Publication

all top 3

Main Field

Software