First Page | Document Content | |
---|---|---|
![]() Date: 2007-12-18 01:20:50Computing Cryptographic protocols Models of computation Universal composability Turing machine Security parameter Computational complexity theory Actor model Ciphertext indistinguishability Theoretical computer science Applied mathematics Cryptography | Add to Reading List |
![]() | Universal Composability Proving the Correctness of Blockchain Protocols Abhiram KothapalliDocID: 1ulMc - View Document |
![]() | Systematizing Secure Computation for Research and Decision Support Jason Perry1 , Debayan Gupta2 , Joan Feigenbaum2 and Rebecca N. Wright1 1DocID: 1rpD9 - View Document |
![]() | LNCSPractical Private Information Aggregation in Large NetworksDocID: 1pxiz - View Document |
![]() | Systematizing Secure Computation for Research and Decision Support Jason Perry1 , Debayan Gupta2 , Joan Feigenbaum2 and Rebecca N. Wright1 1DocID: 1oJIr - View Document |
![]() | Universally Composable Commitments Using Random Oracles Dennis Hofheinz† and J¨orn M¨ uller-Quade† Abstract. In the setting of universal composability [Can01], commitments cannot be implemented without additionalDocID: 1nBvB - View Document |