Back to Results
First PageMeta Content
Communications protocol / Secure multi-party computation / Common reference string model / Secure two-party computation / Commitment scheme / Security parameter / Universal composability / Cryptographic protocols / Data / Information


Obtaining Universally Composable Security: Towards the Bare Bones of Trust∗ Ran Canetti† December 15, 2007 Abstract
Add to Reading List

Document Date: 2007-12-18 22:27:46


Open Document

File Size: 293,94 KB

Share Result on Facebook

Company

IBM / /

Country

United States / /

/

Event

Product Issues / FDA Phase / /

Facility

building UC / /

IndustryTerm

terms plain protocols / multiparty protocol / secure protocols / composable protocols / dense crypto-systems / arbitrary protocols / cryptographic protocols / succinct and efficient algorithms / honest opening protocol / arbitrary other protocols / secure protocol / computationally-efficient sampling algorithm / simpler protocol / actual systems / commitment protocol / plain protocols / polynomial time sampling algorithm / tamper-proof hardware / least protocols / actual protocol / sequential algorithms / protocol protocol / above protocol / provided sampling algorithm / larger systems / /

Organization

T.J. Watson Research Center / National Science Foundation / /

/

Position

deterministic extractor / protocol designer / /

Product

F. / key registration models / CRS / CRS model / hardware token model / /

ProvinceOrState

Arkansas / /

Technology

encryption / sampling algorithm / existing protocols / polynomial time sampling algorithm / composed protocol / two-party protocol / simpler protocol / proposed protocols / two-party protocols / 1 Introduction Designing protocols / public key / above protocol / provided sampling algorithm / multiparty protocol / known protocols / commitment protocol / GUC-emulates protocol / non-committing encryption / same commitment protocol / analyzed protocol / UC-secure protocol / UCemulates protocol / two protocols / UC-emulates protocol / simulation / secure protocol / second encryption / UC protocols / honest opening protocol / two arbitrary protocols / UC secure protocol / protocol protocol / terms plain protocols / /

SocialTag