Two-round and non-interactive concurrent non-malleable commitments from time-lock puzzles
Non-malleable commitments are a fundamental cryptographic tool for preventing
(concurrent) man-in-the-middle attacks. Since their invention by Dolev, Dwork, and Naor in …
(concurrent) man-in-the-middle attacks. Since their invention by Dolev, Dwork, and Naor in …
Founding secure computation on blockchains
We study the foundations of secure computation in the blockchain-hybrid model, where a
blockchain–modeled as a global functionality–is available as an Oracle to all the …
blockchain–modeled as a global functionality–is available as an Oracle to all the …
Obfuscation-based non-black-box simulation and four message concurrent zero knowledge for NP
We show the following result: Assuming the existence of p ublic-coin differing-input
obfuscation (pc-diO) for the class of all polynomial time Turing machines, then there exists a …
obfuscation (pc-diO) for the class of all polynomial time Turing machines, then there exists a …
Round-efficient black-box construction of composable multi-party computation
S Kiyoshima - Annual Cryptology Conference, 2014 - Springer
We present a round-efficient black-box construction of a general MPC protocol that satisfies
composability in the plain model. The security of our protocol is proven in angel-based UC …
composability in the plain model. The security of our protocol is proven in angel-based UC …
Post-quantum simulatable extraction with minimal assumptions: Black-box and constant-round
From the minimal assumption of post-quantum semi-honest oblivious transfers, we build the
first ε-simulatable two-party computation (2PC) against quantum polynomial-time (QPT) …
first ε-simulatable two-party computation (2PC) against quantum polynomial-time (QPT) …
Concurrently composable security with shielded super-polynomial simulators
B Broadnax, N Döttling, G Hartung… - … Conference on the …, 2017 - Springer
We propose a new framework for concurrently composable security that relaxes the security
notion of UC security. As in previous frameworks, our notion is based on the idea of …
notion of UC security. As in previous frameworks, our notion is based on the idea of …
Constant-round black-box construction of composable multi-party computation protocol
We present the first general MPC protocol that satisfies the following:(1) the construction is
black-box,(2) the protocol is universally composable in the plain model, and (3) the number …
black-box,(2) the protocol is universally composable in the plain model, and (3) the number …
On the exact round complexity of self-composable two-party computation
The round complexity of secure computation has been a fundamental problem in
cryptography. Katz and Ostrovsky proved that 5 rounds are both necessary and sufficient for …
cryptography. Katz and Ostrovsky proved that 5 rounds are both necessary and sufficient for …
Explicit non-malleable codes resistant to permutations and perturbations
A non-malleable code protects messages against various classes of tampering. Informally, a
code is non-malleable if the message contained in a tampered codeword is either the …
code is non-malleable if the message contained in a tampered codeword is either the …
Universally Composable SNARKs with Transparent Setup without Programmable Random Oracle
Non-interactive zero-knowledge (NIZK) proofs allow a prover to convince a verifier about the
validity of an NP-statement by sending a single message and without disclosing any …
validity of an NP-statement by sending a single message and without disclosing any …