搜索结果: 1-4 共查到“black-box constructions”相关记录4条 . 查询时间(0.403 秒)
Black-Box Constructions of Signature Schemes in the Bounded Leakage Setting
identity-based signature certificateless signature black-box construction
2017/6/28
To simplify the certificate management procedures, Shamir introduced the concept of identity-based cryptography (IBC). However, the key escrow problem is inherent in IBC. To get rid of it, Al-Riyami a...
Barriers to Black-Box Constructions of Traitor Tracing Systems
two-party computation Secure Multiparty Computation
2015/12/21
Reducibility between different cryptographic primitives is a fundamental problem in modern
cryptography. As one of the primitives, traitor tracing systems help content distributors recover
the ident...
Non-Malleable Zero Knowledge: Black-Box Constructions and Definitional Relationships
foundations / Non-malleability zero knowledge commitments black-box constructions
2012/3/26
This paper deals with efficient non-malleable zero-knowledge proofs for NP, based on general assumptions. We construct a simulation-sound zero-knowledge protocol for NP, based only on the black-box us...
(Nearly) optimal black-box constructions of commitments secure against selective opening attacks
commitments black-box lower bounds zero knowledge
2009/11/18
Selective opening attacks against commitment schemes occur when the commitment
scheme is repeated in parallel (or concurrently) and an adversary can choose depending on
the commit-phase transcript t...