Back to Results
First PageMeta Content
Information / Proof of knowledge / Data / Mathematical proof / Non-interactive zero-knowledge proof / Malleability / Cryptographic protocols / Zero-knowledge proof / Mathematics


Full version of an extended abstract published in Proceedings of Eurocrypt 2012, Springer-Verlag, 2012. Available from the IACR Cryptology ePrint Archive as Report[removed]Malleable Proof Systems and Applications Melis
Add to Reading List

Document Date: 2014-09-03 04:47:41


Open Document

File Size: 698,10 KB

Share Result on Facebook

Company

Let us / Malleable Proof Systems / Furukawa / Microsoft / /

Currency

USD / /

/

Event

Product Recall / Product Issues / /

IndustryTerm

threshold decryption protocol / randomized algorithm / polynomial-time extractor algorithms / witness-indistinguishable proof systems / mix server / polynomial-time simulator algorithm / extractor algorithm / non-interactive zero-knowledge proof systems / proof systems / non-interactive solution / encryption algorithm / /

Organization

Brown University / /

Person

Melissa Chase / Anna Lysyanskaya / Sarah Meiklejohn / /

Position

author / extractor / trustee / /

Product

definition / /

Technology

encryption / adaptively secure encryption / threshold decryption protocol / able Shuffles D.1 BBS encryption / public key / 3 The protocol / encryption algorithm / re-randomizable encryption / extractor algorithm / CM-CCA-secure encryption / polynomial-time extractor algorithms / simulation / PPT algorithms / three PPT algorithms / polynomial-time simulator algorithm / /

SocialTag