Sciweavers

610 search results - page 18 / 122
» Information-theoretically secure protocols and security unde...
Sort
View
ESORICS
2002
Springer
15 years 9 months ago
Confidentiality-Preserving Refinement is Compositional - Sometimes
Confidentiality-preserving refinement describes a relation between a specification and an implementation that ensures that all confidentiality properties required in the specificat...
Thomas Santen, Maritta Heisel, Andreas Pfitzmann
GLOBECOM
2007
IEEE
14 years 11 months ago
Dense Parity Check Based Secrecy Sharing in Wireless Communications
Abstract—It is generally believed harmful to have transmission errors in the wireless communications. The high decoding complexity of dense parity check codes is unfavorable. Thi...
Sheng Xiao, Hossein Pishro-Nik, Weibo Gong
CSFW
2007
IEEE
15 years 3 months ago
Compositional Security for Task-PIOAs
Task-PIOA is a modeling framework for distributed systems with both probabilistic and nondeterministic behaviors. It is suitable for cryptographic applications because its task-bas...
Ran Canetti, Ling Cheung, Dilsun Kirli Kaynar, Nan...
79
Voted
CORR
2007
Springer
150views Education» more  CORR 2007»
14 years 9 months ago
Composable Security in the Bounded-Quantum-Storage Model
We give a new, simulation-based, definition for security in the bounded-quantum-storage model, and show that this definition allows for sequential composition of protocols. Damg...
Stephanie Wehner, Jürg Wullschleger
85
Voted
CCS
2009
ACM
15 years 10 months ago
Universally composable contributory group key exchange
We treat the security of group key exchange (GKE) in the universal composability (UC) framework. Analyzing GKE protocols in the UC framework naturally addresses attacks by maliciou...
M. Choudary Gorantla, Colin Boyd, Juan Manuel Gonz...