Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing 2017
DOI: 10.1145/3055399.3055495
|View full text |Cite
|
Sign up to set email alerts
|

Equivocating Yao

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(2 citation statements)
references
References 23 publications
0
2
0
Order By: Relevance
“…This notion has received considerable attention in the literature, see e.g. [14,16,27,29]. In contrast to adaptive security where an adversary may learn all secrets of a corrupted party, we achieve that remotely hacking a party after it received its first input does not impact the confidentiality and integrity of a party's inputs and outputs, unless all parties have been corrupted.…”
Section: Related Workmentioning
confidence: 96%
“…This notion has received considerable attention in the literature, see e.g. [14,16,27,29]. In contrast to adaptive security where an adversary may learn all secrets of a corrupted party, we achieve that remotely hacking a party after it received its first input does not impact the confidentiality and integrity of a party's inputs and outputs, unless all parties have been corrupted.…”
Section: Related Workmentioning
confidence: 96%
“…In somewhere equivocal (non-committing) encryption [HJO + 16] it is possible to modify a few blocks of the encrypted data. Perhaps the closest concept to our work is the notion of functionally equivocal (non-committing) encryption from the recent work of Canetti, Poburinnaya and Venkitasubramaniam [CPV16]. In that work, it's possible to open a simulated encryption to any message m 0 = f (x) which is in the range of some function f , where f can be an expanding function and the secret key size is only proportional to |x| rather than to |m 0 |.…”
Section: Related Workmentioning
confidence: 99%