View Document Preview and Link
Document Date: 2012-12-17 09:16:36 Open Document File Size: 535,57 KB Share Result on Facebook
Country Israel / Denmark / / / Facility Bar-Ilan University / Aarhus University / / IndustryTerm zero-knowledge protocols / verification algorithm / non-uniform polynomial-time algorithm / protocol / latter algorithms / semi-honest protocols / covert protocol / deterrent secure protocol / covert secure protocols / public-key infrastructure / zero-knowledge protocol / semi-honest secure protocol / malicious secure protocols / semi-honest secure protocols / secure computation protocol / cryptographic protocols / na¨ıve solution / secure protocol / generic protocols / extra algorithms / computation protocol / public verifiability protocol / cryptographic protocol / covert secure protocol / The verification algorithm / / Organization Pi / Aarhus University / Bar-Ilan University / Charlie / European Research Council / Department of Computer Science / Public Verifiability∗ Gilad Asharov Claudio Orlandi† Department of Computer Science / Pj / I. Trusted party / European Union / / Person Claudio Orlandi / Bob / Alice / / Position designer / judge / / Technology malicious secure protocols / Judgement algorithm / signed-OT protocol / PKI / example protocol / two extra algorithms / cryptographic protocol / zero-knowledge protocol / semi-honest protocols / zero-knowledge protocols / public verifiability protocol / secret key / secure computation protocol / semi-honest secure protocols / covert secure protocols / public-key infrastructure / resulting protocol / encryption / secure two-party computation protocol / The verification algorithm / OT protocol / signed-OT based zero-knowledge protocol / verification algorithm / covert protocol / covert secure protocol / deterrent secure protocol / semi-honest secure protocol / simulation / two latter algorithms / non-uniform polynomial-time algorithm / maliciously secure protocol / / SocialTag