Sciweavers

32 search results - page 3 / 7
» Adaptive Hardness and Composable Security in the Plain Model...
Sort
View
WSC
2007
13 years 8 months ago
Composing simulation models using interface definitions based on web service descriptions
Using models in different contexts poses major integration challenges, ranging from technical to conceptual levels. Independently of each other developed model components cannot b...
Mathias Röhl, Stefan Morgenstern
EUROCRYPT
2008
Springer
13 years 8 months ago
New Constructions for UC Secure Computation Using Tamper-Proof Hardware
The Universal Composability framework was introduced by Canetti to study the security of protocols which are concurrently executed with other protocols in a network environment. U...
Nishanth Chandran, Vipul Goyal, Amit Sahai
CRYPTO
2005
Springer
164views Cryptology» more  CRYPTO 2005»
13 years 11 months ago
Composition Does Not Imply Adaptive Security
We study the question whether the sequential or parallel composition of two functions, each indistinguishable from a random function by non-adaptive distinguishers is secure agains...
Krzysztof Pietrzak
PKC
2012
Springer
255views Cryptology» more  PKC 2012»
11 years 8 months ago
Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices
Abstract. An unresolved problem in research on authenticated key exchange (AKE) is to construct a secure protocol against advanced attacks such as key compromise impersonation and ...
Atsushi Fujioka, Koutarou Suzuki, Keita Xagawa, Ka...
ASIACRYPT
2009
Springer
14 years 25 days ago
Simple Adaptive Oblivious Transfer without Random Oracle
Adaptive oblivious transfer (adaptive OT) schemes have wide applications such as oblivious database searches, secure multiparty computation and etc. It is a two-party protocol whic...
Kaoru Kurosawa, Ryo Nojima