{"data":{"id":"10.48550/arxiv.0910.3282","type":"dois","attributes":{"doi":"10.48550/arxiv.0910.3282","prefix":"10.48550","suffix":"arxiv.0910.3282","identifiers":[{"identifier":"0910.3282","identifierType":"arXiv"}],"alternateIdentifiers":[{"alternateIdentifierType":"arXiv","alternateIdentifier":"0910.3282"}],"creators":[{"name":"Yao, Andrew C.","nameType":"Personal","givenName":"Andrew C.","familyName":"Yao","affiliation":[],"nameIdentifiers":[]},{"name":"Yung, Moti","nameType":"Personal","givenName":"Moti","familyName":"Yung","affiliation":[],"nameIdentifiers":[]},{"name":"Zhao, Yunlei","nameType":"Personal","givenName":"Yunlei","familyName":"Zhao","affiliation":[],"nameIdentifiers":[]}],"titles":[{"title":"Adaptive Concurrent Non-Malleability with Bare Public-Keys"}],"publisher":"arXiv","container":{},"publicationYear":2009,"subjects":[{"lang":"en","subject":"Computational Complexity (cs.CC)","subjectScheme":"arXiv"},{"subject":"FOS: Computer and information sciences","subjectScheme":"Fields of Science and Technology (FOS)"},{"subject":"FOS: Computer and information sciences","schemeUri":"http://www.oecd.org/science/inno/38235147.pdf","subjectScheme":"Fields of Science and Technology (FOS)"}],"contributors":[],"dates":[{"date":"2009-10-17T07:28:50Z","dateType":"Submitted","dateInformation":"v1"},{"date":"2009-12-01T12:41:28Z","dateType":"Updated","dateInformation":"v1"},{"date":"2009-10","dateType":"Available","dateInformation":"v1"},{"date":"2009","dateType":"Issued"}],"language":null,"types":{"ris":"GEN","bibtex":"misc","citeproc":"article","schemaOrg":"CreativeWork","resourceType":"Article","resourceTypeGeneral":"Preprint"},"relatedIdentifiers":[],"relatedItems":[],"sizes":[],"formats":[],"version":"1","rightsList":[{"rights":"arXiv.org perpetual, non-exclusive license","rightsUri":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/"}],"descriptions":[{"description":"Concurrent non-malleability (CNM) is central for cryptographic protocols running concurrently in environments such as the Internet. In this work, we formulate CNM in the bare public-key (BPK) model, and show that round-efficient concurrent non-malleable cryptography with full adaptive input selection can be established, in general, with bare public-keys (where, in particular, no trusted assumption is made). Along the way, we clarify the various subtleties of adaptive concurrent non-malleability in the bare public-key model.","descriptionType":"Abstract"},{"description":"41 pages","descriptionType":"Other"}],"geoLocations":[],"fundingReferences":[],"xml":"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","url":"https://arxiv.org/abs/0910.3282","contentUrl":null,"metadataVersion":0,"schemaVersion":"http://datacite.org/schema/kernel-4","source":"mds","isActive":true,"state":"findable","reason":null,"viewCount":0,"viewsOverTime":[],"downloadCount":0,"downloadsOverTime":[],"referenceCount":0,"citationCount":0,"citationsOverTime":[],"partCount":0,"partOfCount":0,"versionCount":0,"versionOfCount":0,"created":"2022-03-15T18:06:01.000Z","registered":"2022-03-15T18:06:02.000Z","published":"2009","updated":"2022-03-15T18:06:02.000Z"},"relationships":{"client":{"data":{"id":"arxiv.content","type":"clients"}},"provider":{"data":{"id":"arxiv","type":"providers"}},"media":{"data":{"id":"10.48550/arxiv.0910.3282","type":"media"}},"references":{"data":[]},"citations":{"data":[]},"parts":{"data":[]},"partOf":{"data":[]},"versions":{"data":[]},"versionOf":{"data":[]}}}}