Sciweavers

165 search results - page 8 / 33
» Safely Composing Security Protocols
Sort
View
56
Voted
LREC
2010
132views Education» more  LREC 2010»
14 years 11 months ago
Resources for Controlled Languages for Alert Messages and Protocols in the European Perspective
This paper is concerned with resources for controlled languages for alert messages and protocols in the European perspective. These resources have been produced as the outcome of ...
Sylviane Cardey, Krzysztof Bogacki, Xavier Blanco,...
CTRSA
2006
Springer
156views Cryptology» more  CTRSA 2006»
15 years 1 months ago
Universally Composable Oblivious Transfer in the Multi-party Setting
We construct efficient universally composable oblivious transfer protocols in the multi-party setting for honest majorities. Unlike previous proposals our protocols are designed in...
Marc Fischlin
IPL
2007
72views more  IPL 2007»
14 years 9 months ago
How to safely close a discussion
In the secure communication problem, we focus on safe termination. In applications such as electronic transactions, we want each party to be ensured that both sides agree on the s...
Gildas Avoine, Serge Vaudenay
CISIM
2007
IEEE
15 years 4 months ago
Universally Composable Key-Evolving Signature
The standard digital signature scheme can be easily subject to key exposure problem In order to overcome this problem; a feasible and effective approach is employed by key-evolving...
Jin Zhou, Yuefei Zhu, TingMao Chang, YaJuan Zhang
TCC
2009
Springer
177views Cryptology» more  TCC 2009»
15 years 10 months ago
Composability and On-Line Deniability of Authentication
Abstract. Protocols for deniable authentication achieve seemingly paradoxical guarantees: upon completion of the protocol the receiver is convinced that the sender authenticated th...
Yevgeniy Dodis, Jonathan Katz, Adam Smith, Shabsi ...