A new approach for UC security concurrent deniable authentication
暂无分享,去创建一个
[1] Fan Zhang,et al. Universally composable anonymous Hash certification model , 2007, Science in China Series F: Information Sciences.
[2] Xiaotie Deng,et al. Deniable authentication protocols , 2001 .
[3] Emmanuel Bresson,et al. A Simple Public-Key Cryptosystem with a Double Trapdoor Decryption Mechanism and Its Applications , 2003, ASIACRYPT.
[4] Yonatan Aumann,et al. Authentication, Enhanced Security and Error Correcting Codes (Extended Abstract) , 1998, CRYPTO.
[5] Jonathan Katz,et al. Adaptively-Secure, Non-interactive Public-Key Encryption , 2005, TCC.
[6] Manuel Blum,et al. Non-interactive zero-knowledge and its applications , 1988, STOC '88.
[7] Aggelos Kiayias,et al. Traitor Tracing with Constant Transmission Rate , 2002, EUROCRYPT.
[8] Yael Tauman Kalai,et al. Smooth Projective Hashing and Two-Message Oblivious Transfer , 2005, Journal of Cryptology.
[9] Ronald Cramer,et al. Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption , 2001, EUROCRYPT.
[10] Feng Tao,et al. Universally Composable Security Concurrent Deniable Authentication Based on Witness Indistinguishable , 2007 .
[11] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[12] Moni Naor,et al. Concurrent zero-knowledge , 2004, JACM.
[13] Aggelos Kiayias,et al. Traceable Signatures , 2004, EUROCRYPT.
[14] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[15] Ran Canetti,et al. Universally composable security: a new paradigm for cryptographic protocols , 2001, Proceedings 2001 IEEE International Conference on Cluster Computing.
[16] Hugo Krawczyk,et al. A modular approach to the design and analysis of authentication and key exchange protocols (extended abstract) , 1998, STOC '98.
[17] Rosario Gennaro,et al. New Approaches for Deniable Authentication , 2005, CCS '05.
[18] Jacques Stern,et al. Advances in Cryptology — EUROCRYPT ’99 , 1999, Lecture Notes in Computer Science.
[19] Yael Tauman Kalai. Smooth Projective Hashing and Two-Message Oblivious Transfer , 2005, EUROCRYPT.