General composition and universal composability in secure multiparty computation

Y Lindell - Journal of cryptology, 2009 - Springer
Concurrent general composition relates to a setting where a secure protocol is run in a
network concurrently with other, arbitrary protocols. Clearly, security in such a setting is what …

Adaptive hardness and composable security in the plain model from standard assumptions

R Canetti, H Lin, R Pass - 2010 IEEE 51st Annual Symposium …, 2010 - ieeexplore.ieee.org
We construct the first general secure computation protocols that require no trusted
infrastructure other than authenticated communication, and that satisfy a meaningful notion …

How to play almost any mental game over the net-concurrent composition via super-polynomial simulation

B Barak, A Sahai - … Annual IEEE Symposium on Foundations of …, 2005 - ieeexplore.ieee.org
We construct a secure protocol for any multiparty functionality that remains secure (under a
relaxed definition of security introduced by Prabhakaran and Sahai (STOC'04)) when …

Adaptive one-way functions and applications

O Pandey, R Pass, V Vaikuntanathan - … Barbara, CA, USA, August 17-21 …, 2008 - Springer
We introduce new and general complexity theoretic hardness assumptions. These
assumptions abstract out concrete properties of a random oracle and are significantly …

Concurrent non-malleable zero knowledge

B Barak, M Prabhakaran, A Sahai - 2006 47th Annual IEEE …, 2006 - ieeexplore.ieee.org
We provide the first construction of a concurrent and non-malleable zero knowledge
argument for every language in NP. We stress that our construction is in the plain model with …

Separating short structure-preserving signatures from non-interactive assumptions

M Abe, J Groth, M Ohkubo - … 2011: 17th International Conference on the …, 2011 - Springer
Abstract Structure-preserving signatures are signatures whose public keys, messages, and
signatures are all group elements in bilinear groups, and the verification is done by …

One-message zero knowledge and non-malleable commitments

N Bitansky, H Lin - Theory of Cryptography: 16th International Conference …, 2018 - Springer
We introduce a new notion of one-message zero-knowledge (1ZK) arguments that satisfy a
weak soundness guarantee—the number of false statements that a polynomial-time non …

Round optimal concurrent MPC via strong simulation

S Badrinarayanan, V Goyal, A Jain, D Khurana… - Theory of Cryptography …, 2017 - Springer
In this paper, we study the round complexity of concurrently secure multi-party computation
(MPC) with super-polynomial simulation (SPS) in the plain model. In the plain model, there …

Trading one-wayness against chosen-ciphertext security in factoring-based encryption

P Paillier, JL Villar - International Conference on the Theory and …, 2006 - Springer
We revisit a long-lived folklore impossibility result for factoring-based encryption and
properly establish that reaching maximally secure one-wayness (ie equivalent to factoring) …

Black-box constructions of composable protocols without set-up

H Lin, R Pass - Annual Cryptology Conference, 2012 - Springer
We present the first black-box construction of a secure multi-party computation protocol that
satisfies a meaningful notion of concurrent security in the plain model (without any set-up …