Computational and Symbolic Anonymity in an Unbounded Network
暂无分享,去创建一个
Hideki Sakurada | Hubert Comon-Lundh | Yusuke Kawamoto | Hubert Comon-Lundh | Yusuke Kawamoto | Hideki Sakurada
[1] Martín Abadi,et al. Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption)* , 2001, Journal of Cryptology.
[2] Jonathan Katz,et al. Ring Signatures: Stronger Definitions, and Constructions without Random Oracles , 2005, IACR Cryptol. ePrint Arch..
[3] Michael Backes,et al. Computational Soundness of Symbolic Zero-Knowledge Proofs Against Active Attackers , 2008, 2008 21st IEEE Computer Security Foundations Symposium.
[4] Véronique Cortier,et al. Computational soundness of observational equivalence , 2008, CCS.
[5] Martín Abadi,et al. Mobile values, new names, and secure communication , 2001, POPL '01.
[6] Hideki Sakurada,et al. Computationally Sound Symbolic Anonymity of a Ring Signature , 2008 .