搜索结果: 1-9 共查到“军事学 simulatability”相关记录9条 . 查询时间(0.059 秒)
Analysis Of The Simulatability Of An Oblivious Transfer
oblivious transfer secure multiparty computation malicious adversaries
2018/12/3
In the Journal of Cryptology (25(1): 158-193. 2012), Shai Halevi and Yael Kalai proposed a general framework for constructing two-message oblivious transfer protocols using smooth projective hashing. ...
Trading Plaintext-Awareness for Simulatability to Achieve Chosen Ciphertext Security
public key encryption key encapsulation mechanism chosen ciphertext security
2016/3/4
In PKC 2014, Dachman-Soled showed a construction of a chosen ciphertext (CCA) secure
public key encryption (PKE) scheme based on a PKE scheme which simultaneously satisfies a security
property calle...
Plaintext-Simulatability
Plaintext-simulatability Plaintext-awareness Chosen-ciphertext security
2009/3/27
We propose a new security class, called plaintext-simulatability, defined over the
public-key encryption schemes. The notion of plaintext simulatability (denoted PS) is similar to the notion of plain...
The Reactive Simulatability (RSIM) Framework for Asynchronous Systems
security cryptography simulatability
2009/3/25
We define reactive simulatability for general asynchronous systems. Roughly, simulatability
means that a real system implements an ideal system (specification) in a way that
preserves security in a ...
On Fairness in Simulatability-based Cryptographic Systems
fairness simulatability cryptographic protocols
2009/3/2
Simulatability constitutes the cryptographic notion of a secure refinement and
has asserted its position as one of the fundamental concepts of modern cryptography.
Although simulatability carefully ...
On the Notion of Statistical Security in Simulatability Definitions
Reactive simulatability universal composability statistical security protocol composition
2009/1/14
We investigate the definition of statistical security (i.e., security against unbounded adversaries) in the framework of reactive simulatability. This framework allows to
formulate and analyze multi-...
Simulatability has established itself as a salient notion for defining and proving the security of cryptographic
protocols since it entails strong security and compositionality guarantees, which are ...
Limits of the Reactive Simulatability/UC of Dolev-Yao Models with Hashes
Reactive Simulatability UC Dolev-Yao Models Hashes
2008/10/30
Automated tools such as model checkers and theorem provers for the
analysis of security protocols typically abstract from cryptography by Dolev-Yao
models, i.e., abstract term algebras replace the r...
On Simulatability Soundness and Mapping Soundness of Symbolic Cryptography
Simulatability Soundness Mapping Soundness Symbolic Cryptography
2008/8/21
The abstraction of cryptographic operations by term algebras, called Dolev-Yao
models or symbolic cryptography, is essential in almost all tool-supported methods for proving
security protocols.