View Document Preview and Link
Document Date: 2014-05-14 14:54:31 Open Document File Size: 586,09 KB Share Result on Facebook
City A.1 DDH / / Company NBC / Smooth Projective Hash Proof Systems We / Smooth Projective Hash Proof Systems / / Currency pence / / / Event FDA Phase / / Facility George Washington University / Virginia Commonwealth University / Columbia University / University of Maryland / / IndustryTerm oblivious-transfer protocols / generation algorithm / zero-knowledge protocols / public-coin protocol / composable protocols / Σ-protocol / decryption algorithm / polynomial-time algorithm / multiparty computation protocols / verifier algorithm / constant-round protocol / secure protocol / coin-tossing protocol / round-optimal protocols / encryption algorithm / pre-processing / honest-verifier zero-knowledge protocol / / MusicGroup Pi / / Organization Columbia University / National Science Foundation / University of Maryland / U.S. Government / Virginia Commonwealth University / U.S. Securities and Exchange Commission / George Washington University / / Person Hong-Sheng Zhou§ May / Jonathan Katz† Hoeteck Wee / Seung Geol Choi∗ Jonathan / / / Position author / / Product Groth-Sahai / UC / Lin11 / Peikert / PVW08 / FLM11 / HK07 / GMY04 / JS07 / / ProvinceOrState Maryland / / Technology three algorithms / randomized algorithm / underlying OT protocol / CCA-Secure Encryption / The encryption algorithm / 3-round honest-verifier zero-knowledge protocol / following PPT algorithms / two-round protocols / input using CCA-secure encryption / zero-knowledge protocols / universally composable protocols / secret key / three-round public-coin protocol / The decryption algorithm / three PPT algorithms / The key generation algorithm / 4-round protocols / verifier algorithm / non-uniform PPT algorithms / Encryption / oblivious-transfer protocols / 6 38 Protocol / four-round OT protocols / constant-round protocol / adaptively secure protocol / public key / four-round protocol / public-key encryption / OT protocol / polynomial-time algorithm / CRS generation algorithm / 2.4 Labeled CCA-Secure Encryption / 3-round protocols / multiparty computation protocols / simulation / coin-tossing protocol / OT protocols / 2.5 Σ-Protocols / / SocialTag