Universal composability

Results: 55



#Item
41Computing / Secure multi-party computation / Secure two-party computation / Cryptography / Zero-knowledge proof / Communications protocol / Internet privacy / Universal composability / Verifiable secret sharing / Cryptographic protocols / Data / Information

On Combining Privacy with Guaranteed Output Delivery in Secure Multiparty Computation? Yuval Ishai1 , Eyal Kushilevitz1 , Yehuda Lindell2?? , and Erez Petrank1 1 Technion ({yuvali,eyalk,erez}@cs.technion.ac.il)

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:55
42Secure two-party computation / Security parameter / Valuation / Mathematics / Applied mathematics / Cryptographic protocols / Secure multi-party computation / Universal composability

Efficient and Secure Multi-Party Computation with Faulty Majority and Complete Fairness Juan A. Garay∗ Philip MacKenzie∗

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2004-03-03 15:33:45
43Universal composability / Communications protocol / Secure multi-party computation / IP / Port / Proof of knowledge / Zero-knowledge proof / Commitment scheme / X Window System / Cryptography / Cryptographic protocols / Data

Efficient and Universally Composable Committed Oblivious Transfer and Applications∗ Juan A. Garay† Philip MacKenzie†

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2004-02-22 16:48:33
44Universal composability / Zero-knowledge proof / Communications protocol / Protocol / Proof of knowledge / Cryptographic protocols / Data / Information

POLLING WITH PHYSICAL ENVELOPES: A RIGOROUS ANALYSIS OF A HUMAN-CENTRIC PROTOCOL∗ TAL MORAN† AND MONI NAOR‡ Abstract. We propose simple, realistic protocols for polling that allow the responder to plausibly repudia

Add to Reading List

Source URL: www.wisdom.weizmann.ac.il

Language: English - Date: 2006-06-14 09:27:06
45Diffie–Hellman key exchange / Public-key cryptography / Diffie–Hellman problem / Decisional Diffie–Hellman assumption / XTR / Internet Key Exchange / Commitment scheme / Cryptography / Cryptographic protocols / Universal composability

Initiator-Resilient Universally Composable Key Exchange Dennis Hofheinz, J¨orn M¨ uller-Quade, and Rainer Steinwandt IAKS, Arbeitsgruppe Systemsicherheit, Prof. Dr. Th. Beth, Fakult¨

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-11-25 06:20:23
46Dolev-Yao model / Secure multi-party computation / Cryptographic primitive / Formal verification / Communications protocol / Transport Layer Security / Authentication protocol / Secure channel / Random oracle / Cryptography / Cryptographic protocols / Universal composability

Report on DIMACS∗ Workshop on Security Analysis of Protocols Date of workshop: June 7 – 9, 2004 Workshop Organizers: John Mitchell, Stanford University Ran Canetti, IBM Watson

Add to Reading List

Source URL: dimacs.rutgers.edu

Language: English - Date: 2005-07-27 15:21:45
47Ciphertext indistinguishability / Universal composability / Oblivious transfer / Common reference string model / Communications protocol / Secure multi-party computation / Cryptosystem / Cryptography / Cryptographic protocols / Public-key cryptography

A Framework for Efficient and Composable Oblivious Transfer Chris Peikert SRI International Vinod Vaikuntanathan MIT∗

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2010-02-04 10:10:06
48Type–token distinction / PP / Universal composability / Oblivious transfer / Security token / Proof of knowledge / Oracle machine / Actor model / Cryptography / Cryptographic protocols / Commitment scheme

General Statistically Secure Computation with Bounded-Resettable Hardware Tokens Nico D¨ottling∗1 , Daniel Kraschewski†2 , J¨orn M¨ uller-Quade3 and Tobias Nilges3 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-07-16 07:08:33
49Universal composability / Computing / Secure multi-party computation / Secure two-party computation / Communications protocol / Universal Turing machine / Cryptography / Turing machine / Cryptographic protocols / Data / Information

A Simpler Variant of Universally Composable Security for Standard Multiparty Computation Ran Canetti∗ Asaf Cohen†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-07-16 10:39:30
50Oracle Database / Concrete security / Universal composability / Perfect forward secrecy / Ciphertext indistinguishability / Random oracle / Cryptography / Cryptographic protocols / Oracle machine

International Workshop on Security – Proceedings of IWSEC ’07 (October 29–[removed], Nara, Japan) A. Miyaji, H. Kikuchi and K. Rannenberg, Eds. Springer-Verlag, LNCS 4752, pages 292–307. On Security Models and Comp

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2012-11-06 05:29:19
UPDATE