Sciweavers

273 search results - page 55 / 55
» Modular Security Proofs for Key Agreement Protocols
Sort
View
TPHOL
2009
IEEE
13 years 11 months ago
Formalising Observer Theory for Environment-Sensitive Bisimulation
Abstract. We consider a formalisation of a notion of observer (or intruder) theories, commonly used in symbolic analysis of security protocols. An observer theory describes the kno...
Jeremy E. Dawson, Alwen Tiu
CRYPTO
2008
Springer
98views Cryptology» more  CRYPTO 2008»
13 years 6 months ago
One-Time Programs
Abstract. In this work, we introduce one-time programs, a new computational paradigm geared towards security applications. A one-time program can be executed on a single input, who...
Shafi Goldwasser, Yael Tauman Kalai, Guy N. Rothbl...
STOC
2007
ACM
136views Algorithms» more  STOC 2007»
14 years 5 months ago
Exponential separations for one-way quantum communication complexity, with applications to cryptography
We give an exponential separation between one-way quantum and classical communication protocols for two partial Boolean functions, both of which are variants of the Boolean Hidden...
Dmitry Gavinsky, Julia Kempe, Iordanis Kerenidis, ...