Security models beyond the "standard" ones of semi-honest and malicious adversaries.
Category contains 5 papers:
[AL10] Yonatan Aumann, Yehuda Lindell. Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries. J Cryptology 2010 [pdf] [bibtex]
Summary: Defines a new model of "covert security" in which honest parties are guaranteed to detect cheating parties with some specified probability. »
[AO12] Gilad Asharov, Claudio Orlandi. Calling Out Cheaters: Covert Security with Public Verifiability. ASIACRYPT 2012 [pdf] [bibtex]
Summary: Augments the covert model of security so that honest parties receive publicly verifiable proof of cheating. »
[HKE12] Yan Huang, Jonathan Katz, David Evans. Quid-Pro-Quo-tocols: Strengthening Semi-honest Protocols with Dual Execution. S&P 2012 [pdf] [bibtex]
[MF06] Payman Mohassel, Matthew Franklin. Efficiency Tradeoffs for Malicious Two-Party Computation. PKC 2006 [pdf] [bibtex]
- Home page
- All papers, by:
- .. category
- .. author names
- .. publication date
- .. recently added
- .. recently updated
- Glossary
- About
- Just getting started in MPC?
- Guidelines
- Todo List
Search Papers
Bibliography Categories