Multi-trapdoor Commitments and their Applications to Proofs of Knowledge Secure under Concurrent Man-in-the-middle Attacks (2004)

Cached

Download Links

by Rosario Gennaro
Venue:Advances in Cryptology – proc. of CRYPTO ’04, LNCS 3152
Citations:14 - 1 self

Active Bibliography

26 Strengthening Zero-Knowledge Protocols using Signatures – Juan A. Garay, Philip MacKenzie, Ke Yang - 2003
12 Efficient Cryptographic Protocols Preventing “Man-in-the-Middle” Attacks – Jonathan Katz - 2002
3 Concurrent/Resettable Zero-Knowledge with Concurrent Soundness in the Bare Public-Key Model and Its Applications – Yunlei Zhao - 2003
33 On Simulation-Sound Trapdoor Commitments – Philip MacKenzie, Ke Yang - 2003
Concurrent Knowledge Extraction in the Public-Key Model ∗ – Andrew C. C. Yao, Moti Yung, Yunlei Zhao - 908
28 Identification protocols secure against reset attacks – Mihir Bellare, Marc Fischlin, Shafi Goldwasser, Silvio Micali - 2001
3 Concurrently Non-Malleable Zero Knowledge in the Authenticated Public-Key Model – Yi Deng, Giovanni Di Crescenzo, Dongdai Lin - 2006
27 Efficient and Non-Malleable Proofs of Plaintext Knowledge and Applications (Extended Abstract) – Jonathan Katz - 2002
135 Practical Verifiable Encryption and Decryption of Discrete Logarithms – Jan Camenisch, Victor Shoup - 2003
2 Precise Zero Knowledge – Silvio Micali, Rafael Pass - 2007
12 Efficient Proofs of Knowledge of Discrete Logarithms and Representations in Groups with Hidden Order – Endre Bangerter, Jan Camenisch, Ueli Maurer - 2005
2 The power of identification schemes – Kaoru Kurosawa, Swee-huay Heng - 2006
3 On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures – Guilin Wang, Joonsang Baek, Duncan S. Wong, Feng Bao
1 Efficient Cryptographic Primitives for Non-Interactive Zero-Knowledge Proofs and Applications – Kristiyan Haralambiev - 2011
A New Family of Practical Non-Malleable Protocols – Andrew C. Yao, et al. - 2011
1 New Tools in Cryptography: Mutually Indepent Commitments, Tweakable Block Ciphers, and Plaintext Awareness via Key Registration – Silvio M. Micali - 2004
14 Concurrent General Composition of Secure Protocols in the Timing Model – Yael Tauman Kalai, Yehuda Lindell, Manoj Prabhakaran - 2006
2 Concurrent Composition of Secure Protocols in the Timing Model – Yael Tauman Kalai, Yehuda Lindell, Manoj Prabhakaran - 2006
29 Resettably-Sound Zero-Knowledge and its Applications – Boaz Barak, Oded Goldreich, Shafi Goldwasser, Yehuda Lindell - 2001