Universally composable anonymous Hash certification model
暂无分享,去创建一个
Fan Zhang | Jianfeng Ma | Sang-Jae Moon | Jianfeng Ma | S. Moon | Fan Zhang
[1] Martín Abadi,et al. Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption)* , 2001, Journal of Cryptology.
[2] Ran Canetti,et al. Universally composable signature, certification, and authentication , 2004, Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004..
[3] C. Pandu Rangan,et al. Progress in Cryptology — INDOCRYPT 2001 , 2001, Lecture Notes in Computer Science.
[4] Yehuda Lindell. Composition of Secure Multi-Party Protocols: A Comprehensive Study , 2003 .
[5] Ran Canetti,et al. Universally Composable Commitments , 2001, CRYPTO.
[6] Mårten Trolin. A Universally Composable Scheme for Electronic Cash , 2005, INDOCRYPT.
[7] Andrew Chi-Chih Yao,et al. Protocols for Secure Computations (Extended Abstract) , 1982, FOCS.
[8] Birgit Pfitzmann,et al. A model for asynchronous reactive systems and its application to secure message transmission , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[9] Yehuda Lindell,et al. Universally composable two-party and multi-party secure computation , 2002, STOC '02.
[10] Martín Abadi,et al. Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption)* , 2000, Journal of Cryptology.
[11] Michael Backes,et al. How to Break and Repair a Universally Composable Signature Functionality , 2004, ISC.
[12] Yehuda Lindell,et al. Universally Composable Password-Based Key Exchange , 2005, EUROCRYPT.
[13] John C. Mitchell,et al. Composition of Cryptographic Protocols in a Probabilistic Polynomial-Time Process Calculus , 2003, CONCUR.
[14] Ivan Damgård,et al. Perfect Hiding and Perfect Binding Universally Composable Commitment Schemes with Constant Expansion Factor , 2001, CRYPTO.
[15] Hugo Krawczyk,et al. Security Analysis of IKE's Signature-Based Key-Exchange Protocol , 2002, CRYPTO.
[16] Wenbo Mao,et al. Modern Cryptography: Theory and Practice , 2003 .
[17] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[18] Silvio Micali,et al. A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks , 1988, SIAM J. Comput..
[19] Donald Beaver,et al. Foundations of Secure Interactive Computing , 1991, CRYPTO.
[20] Ralph C. Merkle,et al. Protocols for Public Key Cryptosystems , 1980, 1980 IEEE Symposium on Security and Privacy.
[21] Amit Sahai,et al. New notions of security: achieving universal composability without trusted setup , 2004, STOC '04.
[22] Ran Canetti,et al. Universally Composable Symbolic Analysis of Cryptographic Protocols (The case of encryption-based mutual authentication and key exchange) , 2004, IACR Cryptol. ePrint Arch..
[23] Ran Canetti,et al. Universally composable security: a new paradigm for cryptographic protocols , 2001, Proceedings 2001 IEEE International Conference on Cluster Computing.
[24] Hugo Krawczyk,et al. Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels , 2001, EUROCRYPT.
[25] Yehuda Lindell,et al. General Composition and Universal Composability in Secure Multiparty Computation , 2003, 44th Annual IEEE Symposium on Foundations of Computer Science, 2003. Proceedings..
[26] Ji Qing. Towards Analyzing Some Kinds of Critically Formal Models for Network Security Protocols , 2005 .
[27] Yehuda Lindell. General Composition and Universal Composability in Secure Multiparty Computation , 2008, Journal of Cryptology.
[28] Hugo Krawczyk,et al. Universally Composable Notions of Key Exchange and Secure Channels , 2002, EUROCRYPT.