共 41 条
[1]
Succinct Garbling Schemes from Functional Encryption Through a Local Simulation Paradigm
[J].
THEORY OF CRYPTOGRAPHY, TCC 2018, PT II,
2018, 11240
:455-472
[2]
Barak B., 2002, Randomization and Approximation Techniques in Computer Science. 6th International Workshop, RANDOM 2002. Proceedings (Lecture Notes in Computer Science Vol.2483), P194
[3]
How to go beyond the black-box simulation barrier
[J].
42ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS,
2001,
:106-115
[4]
UNIVERSAL ARGUMENTS AND THEIR APPLICATIONS
[J].
SIAM JOURNAL ON COMPUTING,
2008, 38 (05)
:1661-1694
[5]
Bitansky N., 2023, LIPIcs, V251
[6]
Bitansky N., 2020, LIPIcs, V151
[7]
PPAD is as Hard as LWE and Iterated Squaring
[J].
THEORY OF CRYPTOGRAPHY, TCC 2022, PT II,
2022, 13748
:593-622
[8]
Multi-collision Resistance: A Paradigm for Keyless Hash Functions
[J].
STOC'18: PROCEEDINGS OF THE 50TH ANNUAL ACM SIGACT SYMPOSIUM ON THEORY OF COMPUTING,
2018,
:671-684
[10]
Time-Lock Puzzles from Randomized Encodings
[J].
ITCS'16: PROCEEDINGS OF THE 2016 ACM CONFERENCE ON INNOVATIONS IN THEORETICAL COMPUTER SCIENCE,
2016,
:345-356