Black-Box Composition Does Not Imply Adaptive Security
- 1 January 2004
- book chapter
- Published by Springer Nature
Abstract
No abstract availableKeywords
This publication has 12 references indexed in Scilit:
- Lower bounds on the efficiency of encryption and digital signature schemesPublished by Association for Computing Machinery (ACM) ,2003
- Lower bounds on the efficiency of generic cryptographic constructionsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- The relationship between public key encryption and oblivious transferPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- On the impossibility of basing trapdoor functions on trapdoor predicatesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2001
- Resettably-sound zero-knowledge and its applicationsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2001
- Security amplification by composition: The case of doubly-iterated, ideal ciphersPublished by Springer Nature ,1998
- Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systemsJournal of the ACM, 1991
- How to Construct Pseudorandom Permutations from Pseudorandom FunctionsSIAM Journal on Computing, 1988
- How to construct random functionsJournal of the ACM, 1986
- Relativizations of the $\mathcal{P} = ?\mathcal{NP}$ QuestionSIAM Journal on Computing, 1975