Lindell, Yehuda Fast cut-and-choose-based protocols for malicious and covert adversaries. (English) Zbl 1355.94068 J. Cryptology 29, No. 2, 456-490 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{Y. Lindell}, J. Cryptology 29, No. 2, 456--490 (2016; Zbl 1355.94068) Full Text: DOI
Faust, Sebastian; Hazay, Carmit; Nielsen, Jesper Buus; Nordholt, Peter Sebastian; Zottarel, Angela Signature schemes secure against hard-to-invert leakage. (English) Zbl 1355.94053 J. Cryptology 29, No. 2, 422-455 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Faust} et al., J. Cryptology 29, No. 2, 422--455 (2016; Zbl 1355.94053) Full Text: DOI
Abe, Masayuki; Fuchsbauer, Georg; Groth, Jens; Haralambiev, Kristiyan; Ohkubo, Miyako Structure-preserving signatures and commitments to group elements. (English) Zbl 1355.94042 J. Cryptology 29, No. 2, 363-421 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Abe} et al., J. Cryptology 29, No. 2, 363--421 (2016; Zbl 1355.94042) Full Text: DOI
Beimel, Amos; Farràs, Oriol; Mintz, Yuval Secret-sharing schemes for very dense graphs. (English) Zbl 1355.94047 J. Cryptology 29, No. 2, 336-362 (2016). MSC: 94A62 05C42 PDFBibTeX XMLCite \textit{A. Beimel} et al., J. Cryptology 29, No. 2, 336--362 (2016; Zbl 1355.94047) Full Text: DOI Link
Haitner, Iftach; Omri, Eran; Zarosim, Hila Limits on the usefulness of random oracles. (English) Zbl 1355.94060 J. Cryptology 29, No. 2, 283-335 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{I. Haitner} et al., J. Cryptology 29, No. 2, 283--335 (2016; Zbl 1355.94060) Full Text: DOI
Gennaro, Rosario; Hazay, Carmit; Sorensen, Jeffrey S. Automata evaluation and text search protocols with simulation-based security. (English) Zbl 1355.94057 J. Cryptology 29, No. 2, 243-282 (2016). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{R. Gennaro} et al., J. Cryptology 29, No. 2, 243--282 (2016; Zbl 1355.94057) Full Text: DOI