Back to Results
First PageMeta Content
Computing / Information / Secure multi-party computation / Zero-knowledge proof / Actor model / Communications protocol / Ciphertext indistinguishability / X Window System / Commitment scheme / Cryptographic protocols / Cryptography / Data


What Information is Leaked under Concurrent Composition?∗ Vipul Goyal Microsoft Research India and
Add to Reading List

Document Date: 2015-05-04 11:22:52


Open Document

File Size: 633,40 KB

Share Result on Facebook

Company

Microsoft Research India / /

Currency

pence / /

/

Event

FDA Phase / /

Facility

Boston University / Divya Gupta† University of California / Abhishek Jain‡ Massachusetts Institute of Technology / /

IndustryTerm

secure computation protocol / secure protocols / cryptographic protocols / semi-honest secure computation protocol / secure computation protocols / secure protocol / concurrent zero-knowledge protocol / concurrent zeroknowledge protocol / final protocol / leakage-resilient secure computation protocols / semi-honest secure protocol / intrusion-resilient secret sharing protocol / /

Organization

e.g. / University of California / Los Angeles / Massachusetts Institute of Technology / Boston University / P1 / /

Person

Abhishek Jain / /

Position

extractor / /

Product

Dziembowski / BPS06 / KP01 / P1 / GMW87 / MIQ / /

Technology

concurrently secure protocols / cryptography / two-party protocol / concurrently secure protocol / Leakage-resilient Interactive Protocols / concurrent zeroknowledge protocol / leakage-resilient secure computation protocols / secure computation protocols / intrusion-resilient secret sharing protocol / semi-honest secure computation protocol / semi-honest secure protocol / simulation / final protocol / real two-party protocol / concurrent zero-knowledge protocol / Los Angeles divyag@cs.ucla.edu Abhishek Jain‡ Massachusetts Institute of Technology / concurrently secure MPC protocol / concurrently secure computation protocol / /

SocialTag