Back to Results
First PageMeta Content
Key management / Zero-knowledge proof / Secure multi-party computation / Standard model / Secure two-party computation / Alice and Bob / IP / Trusted third party / Public key infrastructure / Cryptography / Cryptographic protocols / Public-key cryptography


Calling out Cheaters: Covert Security With Public Verifiability∗ Gilad Asharov Claudio Orlandi†
Add to Reading List

Document Date: 2012-12-17 09:16:36


Open Document

File Size: 535,57 KB

Share Result on Facebook

Country

Israel / Denmark / /

/

Facility

Bar-Ilan University / Aarhus University / /

IndustryTerm

zero-knowledge protocols / verification algorithm / non-uniform polynomial-time algorithm / protocol / latter algorithms / semi-honest protocols / covert protocol / deterrent secure protocol / covert secure protocols / public-key infrastructure / zero-knowledge protocol / semi-honest secure protocol / malicious secure protocols / semi-honest secure protocols / secure computation protocol / cryptographic protocols / na¨ıve solution / secure protocol / generic protocols / extra algorithms / computation protocol / public verifiability protocol / cryptographic protocol / covert secure protocol / The verification algorithm / /

Organization

Pi / Aarhus University / Bar-Ilan University / Charlie / European Research Council / Department of Computer Science / Public Verifiability∗ Gilad Asharov Claudio Orlandi† Department of Computer Science / Pj / I. Trusted party / European Union / /

Person

Claudio Orlandi / Bob / Alice / /

Position

designer / judge / /

Technology

malicious secure protocols / Judgement algorithm / signed-OT protocol / PKI / example protocol / two extra algorithms / cryptographic protocol / zero-knowledge protocol / semi-honest protocols / zero-knowledge protocols / public verifiability protocol / secret key / secure computation protocol / semi-honest secure protocols / covert secure protocols / public-key infrastructure / resulting protocol / encryption / secure two-party computation protocol / The verification algorithm / OT protocol / signed-OT based zero-knowledge protocol / verification algorithm / covert protocol / covert secure protocol / deterrent secure protocol / semi-honest secure protocol / simulation / two latter algorithms / non-uniform polynomial-time algorithm / maliciously secure protocol / /

SocialTag