How to simulate it–a tutorial on the simulation proof technique

Y Lindell - Tutorials on the Foundations of Cryptography …, 2017 - Springer
One of the most fundamental notions of cryptography is that of simulation. It stands behind
the concepts of semantic security, zero knowledge, and security for multiparty computation …

High-frequency trading on decentralized on-chain exchanges

L Zhou, K Qin, CF Torres, DV Le… - 2021 IEEE Symposium …, 2021 - ieeexplore.ieee.org
Decentralized exchanges (DEXs) allow parties to participate in financial markets while
retaining full custody of their funds. However, the transparency of blockchain-based DEX in …

Sok: Transparent dishonesty: front-running attacks on blockchain

S Eskandari, S Moosavi, J Clark - … Workshops, VOTING and WTSC, St. Kitts …, 2020 - Springer
We consider front-running to be a course of action where an entity benefits from prior access
to privileged market information about upcoming transactions and trades. Front-running has …

Universally composable security: A new paradigm for cryptographic protocols

R Canetti - Proceedings 42nd IEEE Symposium on Foundations …, 2001 - ieeexplore.ieee.org
We propose a novel paradigm for defining security of cryptographic protocols, called
universally composable security. The salient property of universally composable definitions …

Efficient multiparty protocols using circuit randomization

D Beaver - Advances in Cryptology—CRYPTO'91: Proceedings 11, 1992 - Springer
The difference between theory and practice often rests on one major factor: efficiency. In
distributed systems, communication is usually expensive, and protocols designed for …

Security and composition of multiparty cryptographic protocols

R Canetti - Journal of CRYPTOLOGY, 2000 - Springer
We present general definitions of security for multiparty cryptographic protocols, with focus
on the task of evaluating a probabilistic function of the parties' inputs. We show that, with …

[PDF][PDF] Secure multi-party computation

O Goldreich - Manuscript. Preliminary version, 1998 - Citeseer
More than ten years have elapsed since the rst completeness theorems for two-party and
multi-party fault-tolerant computation have been announced (by Yao and Goldreich, Micali …

Secure multiparty computation for privacy preserving data mining

Y Lindell - Encyclopedia of data warehousing and mining, 2005 - igi-global.com
The increasing use of data-mining tools in both the public and private sectors raises
concerns regarding the potentially sensitive nature of much of the data being mined. The …

A forward-secure public-key encryption scheme

R Canetti, S Halevi, J Katz - International Conference on the Theory and …, 2003 - Springer
Cryptographic computations are often carried out on insecure devices for which the threat of
key exposure represents a serious and realistic concern. In an effort to mitigate the damage …

[PDF][PDF] Adaptively secure multi-party computation

R Canetti, U Feige, O Goldreich, M Naor - Proceedings of the twenty …, 1996 - dl.acm.org
A fundamental problem in designing secure multi-party protocols is how to deal with
adaptive adversaries (ie, adversaries that may choose the corrupted parties during the …