Universally composable incoercibility
D Unruh, J Müller-Quade - Advances in Cryptology–CRYPTO 2010: 30th …, 2010 - Springer
… To define what it means that the real protocol is incoercible (or more precisely, as
incoercible as the ideal model), we will use the concept of simulation that underlies many …
incoercible as the ideal model), we will use the concept of simulation that underlies many …
Incoercible multi-party computation and universally composable receipt-free voting
… the first universally composable notion of incoercible multi-… We define natural notions of UC
incoercibility corresponding … which realize our notions of UC incoercibility given access to an …
incoercibility corresponding … which realize our notions of UC incoercibility given access to an …
Evaluating security of voting schemes in the universal composability framework
J Groth - Applied Cryptography and Network Security: Second …, 2004 - Springer
… This simplifies security proofs since we only need to prove universal composability to … ,
universal composability of a voting scheme does not guarantee universal verifiability, incoercibility…
universal composability of a voting scheme does not guarantee universal verifiability, incoercibility…
Receipt-free universally-verifiable voting with everlasting privacy
… Universal Composability model, given that the underlying commitment is universally
composable… that is receipt-free under our definition is incoercible as well). Loosely, both definitions …
composable… that is receipt-free under our definition is incoercible as well). Loosely, both definitions …
On the incoercibility of digital signatures
… security model for incoercible signature schemes … incoercible signature scheme can be
viewed as a transformation of any generic signature scheme. Indeed, we present two incoercible …
viewed as a transformation of any generic signature scheme. Indeed, we present two incoercible …
Symbolic universal composability
F Böhl, D Unruh - Journal of Computer Security, 2016 - content.iospress.com
We introduce a variant of the Universal Composability framework (UC; Canetti, FOCS 2001)
that uses symbolic cryptography. Two salient properties of the UC framework are secure …
that uses symbolic cryptography. Two salient properties of the UC framework are secure …
Adaptively secure two-party computation from indistinguishability obfuscation
R Canetti, S Goldwasser, O Poburinnaya - Theory of Cryptography: 12th …, 2015 - Springer
… definition and is also universally composable. Furthermore, … incoercible distributed function
evaluation. Let f : (10, 1l∗ )n → (10, 1l∗ )n be an n-party function, and let Jf be the incoercible …
evaluation. Let f : (10, 1l∗ )n → (10, 1l∗ )n be an n-party function, and let Jf be the incoercible …
Adaptively secure two-party computation from indistinguishability obfuscation
R Canetti, S Goldwasser, O Poburinnaya - Cryptology ePrint Archive, 2014 - eprint.iacr.org
… definition and is also universally composable. Furthermore, … We say that π is incoercible if
it UC-emulates an incoercible … notion of incoercibility: Indeed, F provides “ideal incoercibility” …
it UC-emulates an incoercible … notion of incoercibility: Indeed, F provides “ideal incoercibility” …
Split-ballot voting: everlasting privacy with distributed trust
… is secure in the universal composability (UC) framework, … are not, themselves, universally
composable (we propose using a … -based models (such as universal composability), since the …
composable (we propose using a … -based models (such as universal composability), since the …
Public evidence from secret ballots
M Bernhard, J Benaloh, J Alex Halderman… - … Joint Conference, E …, 2017 - Springer
… Incoercibility has been defined and examined in the universally composable framework in
the context of general multiparty computation [22, 90]. These definitions examine whether the …
the context of general multiparty computation [22, 90]. These definitions examine whether the …