Zobrazeno 1 - 10
of 166
pro vyhledávání: '"Ran Canetti"'
Autor:
Ran Canetti
Publikováno v:
Journal of the ACM. 67:1-94
This work presents a general framework for describing cryptographic protocols and analyzing their security. The framework allows specifying the security requirements of practically any cryptographic task in a unified and systematic way. Furthermore,
Autor:
Ghada Almashaqbeh, Ran Canetti, Yaniv Erlich, Jonathan Gershoni, Tal Malkin, Itsik Pe’er, Anna Roitburd-Berman, Eran Tromer
Publikováno v:
Advances in Cryptology – EUROCRYPT 2022 ISBN: 9783031069437
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::30fa4fc16709eff585b2f1aa379b2839
https://doi.org/10.1007/978-3-031-06944-4_26
https://doi.org/10.1007/978-3-031-06944-4_26
Publikováno v:
Advances in Cryptology – ASIACRYPT 2022 ISBN: 9783031229657
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::daaafbcae285e69fbee17a35c9f2a228
https://doi.org/10.1007/978-3-031-22966-4_16
https://doi.org/10.1007/978-3-031-22966-4_16
Publikováno v:
Advances in Cryptology – CRYPTO 2022 ISBN: 9783031159787
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::7b0afee53492aa2ff3ae73b3a9c4ac80
https://doi.org/10.1007/978-3-031-15979-4_1
https://doi.org/10.1007/978-3-031-15979-4_1
Publikováno v:
SSRN Electronic Journal.
Autor:
Ran Canetti, Ari Karchmer
Publikováno v:
Theory of Cryptography ISBN: 9783030904555
TCC (3)
TCC (3)
We consider the task of learning a function via oracle queries, where the queries and responses are monitored (and perhaps also modified) by an untrusted intermediary. Our goal is twofold: First, we would like to prevent the intermediary from gaining
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::8e8012e674a9ce5c65c27a9db62f7b39
https://doi.org/10.1007/978-3-030-90456-2_1
https://doi.org/10.1007/978-3-030-90456-2_1
Publikováno v:
SSRN Electronic Journal.
Individuals expose personally identifying information to access a website or qualify for a loan, undermining privacy and security. Firms share proprietary information in dealmaking negotiations; if the deal fails, the negotiating partner may use that
Publikováno v:
Journal of Cryptology. 34
Fuzzy extractors (Dodis et al., in Advances in cryptology—EUROCRYPT 2014, Springer, Berlin, 2014, pp 93–110) convert repeated noisy readings of a secret into the same uniformly distributed key. To eliminate noise, they require an initial enrollme
Publikováno v:
CCS
Building on the Gennaro & Goldfeder and Lindell & Nof protocols (CCS '18), we present two threshold ECDSA protocols, for any number of signatories and any threshold, that improve as follows over the state of the art: -- For both protocols, only the l
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030453879
Public Key Cryptography (2)
Public Key Cryptography (2)
Oblivious Transfer (OT) is an important building block for multi-party computation (MPC). Since OT requires expensive public-key operations, efficiency-conscious MPC protocols use an OT extension (OTE) mechanism [Beaver 96, Ishai et al. 03] to provid
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e55027191f5b5e06ad004e12499d0596
https://doi.org/10.1007/978-3-030-45388-6_11
https://doi.org/10.1007/978-3-030-45388-6_11