Two-round and non-interactive concurrent non-malleable commitments from time-lock puzzles

H Lin, R Pass, P Soni - SIAM Journal on Computing, 2020 - SIAM
Non-malleable commitments are a fundamental cryptographic tool for preventing
(concurrent) man-in-the-middle attacks. Since their invention by Dolev, Dwork, and Naor in …

Founding secure computation on blockchains

AR Choudhuri, V Goyal, A Jain - … on the Theory and Applications of …, 2019 - Springer
We study the foundations of secure computation in the blockchain-hybrid model, where a
blockchain–modeled as a global functionality–is available as an Oracle to all the …

Obfuscation-based non-black-box simulation and four message concurrent zero knowledge for NP

O Pandey, M Prabhakaran, A Sahai - Theory of Cryptography Conference, 2015 - Springer
We show the following result: Assuming the existence of p ublic-coin differing-input
obfuscation (pc-diO) for the class of all polynomial time Turing machines, then there exists a …

Round-efficient black-box construction of composable multi-party computation

S Kiyoshima - Annual Cryptology Conference, 2014 - Springer
We present a round-efficient black-box construction of a general MPC protocol that satisfies
composability in the plain model. The security of our protocol is proven in angel-based UC …

Post-quantum simulatable extraction with minimal assumptions: Black-box and constant-round

NH Chia, KM Chung, X Liang, T Yamakawa - Annual International …, 2022 - Springer
From the minimal assumption of post-quantum semi-honest oblivious transfers, we build the
first ε-simulatable two-party computation (2PC) against quantum polynomial-time (QPT) …

Concurrently composable security with shielded super-polynomial simulators

B Broadnax, N Döttling, G Hartung… - … Conference on the …, 2017 - Springer
We propose a new framework for concurrently composable security that relaxes the security
notion of UC security. As in previous frameworks, our notion is based on the idea of …

Constant-round black-box construction of composable multi-party computation protocol

S Kiyoshima, Y Manabe, T Okamoto - Theory of Cryptography Conference, 2014 - Springer
We present the first general MPC protocol that satisfies the following:(1) the construction is
black-box,(2) the protocol is universally composable in the plain model, and (3) the number …

On the exact round complexity of self-composable two-party computation

S Garg, S Kiyoshima, O Pandey - … on the Theory and Applications of …, 2017 - Springer
The round complexity of secure computation has been a fundamental problem in
cryptography. Katz and Ostrovsky proved that 5 rounds are both necessary and sufficient for …

Explicit non-malleable codes resistant to permutations and perturbations

S Agrawal, D Gupta, HK Maji, O Pandey… - Cryptology ePrint …, 2014 - eprint.iacr.org
A non-malleable code protects messages against various classes of tampering. Informally, a
code is non-malleable if the message contained in a tampered codeword is either the …

Universally Composable SNARKs with Transparent Setup without Programmable Random Oracle

C Badertscher, M Campanelli, M Ciampi… - Cryptology ePrint …, 2024 - eprint.iacr.org
Non-interactive zero-knowledge (NIZK) proofs allow a prover to convince a verifier about the
validity of an NP-statement by sending a single message and without disclosing any …