Universal composability

Results: 55



#Item
31Data / Internet protocols / Universal composability / Authentication protocol / Password authentication protocol / Radio-frequency identification / Cryptography / Cryptographic protocols / Information

Universally Composable and Forward Secure RFID Authentication and Authenticated Key Exchange Tri van Le, Mike Burmester, Breno de Medeiros Department of Computer Science, Florida State University Tallahassee, Florida, FL

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-12-05 18:44:49
32Universal composability / Authentication protocol / Password authentication protocol / Secure multi-party computation / Integrated Windows Authentication / Authentication / Password / Man-in-the-middle attack / Kerberos / Cryptography / Cryptographic protocols / Security

Secure Computation Without Authentication∗ Boaz Barak† Ran Canetti‡ Yehuda Lindell§

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-08-20 14:16:00
33Data / Password-authenticated key agreement / Password / Universal composability / OTPW / Cryptographic protocols / Cryptography / Information

Practical Yet Universally Composable Two-Server Password-Authenticated Secret Sharing∗ Jan Camenisch Anna Lysyanskaya

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-21 10:51:23
34Secure two-party computation / Public-key cryptography / Oblivious transfer / Commitment scheme / Cryptography / Cryptographic protocols / Universal composability

Somewhat Non-Committing Encryption and Efficient Adaptively Secure Oblivious Transfer Juan A. Garay∗ Daniel Wichs†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-04-15 13:34:55
35Secure multi-party computation / Communications protocol / X Window System / Public-key cryptography / Cryptography / Cryptographic protocols / Universal composability

Impossibility Results for Universal Composability in Public-Key Models and with Fixed Inputs∗ Dafna Kidron† Yehuda Lindell‡

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-06-06 06:39:24
36Universal composability / Digital signature / Ring signature / Model theory / Structure / Cryptography / Public-key cryptography / Cryptographic protocols

How to Break and Repair a Universally Composable Signature Functionality Michael Backes† and Dennis Hofheinz? Abstract. Canetti and Rabin recently proposed a universally composable ideal functionality FSIG for digital

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-11-19 16:37:53
37Computing / Tokens / Data transmission / Security token / Oblivious transfer / Actor model / Token / Universal composability / Access token / Cryptographic protocols / Data / Information

c IACRThis article is the final version submitted by the author(s) to the IACR and to Springer-Verlag on 2013 December 3. The version published by Springer-Verlag is available at . (Efficient) Universally C

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-12-11 22:12:12
38Communications protocol / Secure multi-party computation / Common reference string model / Secure two-party computation / Commitment scheme / Security parameter / Universal composability / Cryptographic protocols / Data / Information

Obtaining Universally Composable Security: Towards the Bare Bones of Trust∗ Ran Canetti† December 15, 2007 Abstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-12-18 22:27:46
39Computing / Cryptographic protocols / Models of computation / Universal composability / Turing machine / Security parameter / Computational complexity theory / Actor model / Ciphertext indistinguishability / Theoretical computer science / Applied mathematics / Cryptography

DattaKuestersMitchellRamanathan-TCC-2005.dvi

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2007-12-18 01:20:50
40Cryptographic protocols / Object-oriented programming / Communications protocol / Data transmission / Protocols / Trusted system / Cryptography / Universal composability / Computer security / Computing / Security / Data

On Adversary Models and Compositional Security Anupam Datta, Jason Franklin, Deepak Garg, Limin Jia and Dilsun Kaynar Carnegie Mellon University Abstract We present a representative development in the science of security

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2014-11-11 20:30:18
UPDATE