搜索结果: 1-10 共查到“simulation-based security”相关记录10条 . 查询时间(0.187 秒)
On the Achievability of Simulation-Based Security for Functional Encryption
Simulation-Based Functional Encryption
2014/3/12
This work attempts to clarify to what extent simulation-based security (SIM-security) is achievable for functional encryption (FE) and its relation to the weaker indistinguishability-based security (I...
Automata Evaluation and Text Search Protocols with Simulation Based Security
text search malicious adversary simulation based security
2010/9/21
This paper presents an efficient protocol for securely computing the fundamental problem of {\em pattern matching}. This problem is defined in the two-party setting, where party P1 holds a pattern and...
Ideal Key Derivation and Encryption in Simulation-based Security
cryptographic protocols simulation-based security
2010/7/13
Many real-world protocols, such as SSL/TLS, SSH, IPsec, IEEE 802.11i, DNSSEC, and Kerberos, derive new keys from other keys. To be able to analyze such protocols in a composable way, in this paper we ...
Efficient Oblivious Polynomial Evaluation with Simulation-Based Security
secure two-party computation efficient protocols full simulation-based security
2009/9/27
The study of secure multiparty computation has yielded powerful feasibility results showing
that any efficient functionality can be securely computed in the presence of malicious adver-
saries. Desp...
Efficient Oblivious Polynomial Evaluation with Simulation-Based Security
secure two-party computation efficient protocols full simulation-based security
2009/9/22
The study of secure multiparty computation has yielded powerful feasibility results showing
that any efficient functionality can be securely computed in the presence of malicious adver-
saries. Desp...
Simulation based security in the applied pi calculus
security protocols applied pi calculus Needham-Schroeder-Lowe protocol
2009/6/15
We present a symbolic framework for refinement and composition of
security protocols. The framework uses the notion of ideal functionalities. These
are abstract systems which are secure by construct...
Handling Expected Polynomial-Time Strategies in Simulation-Based Security Proofs
expected polynomial-time black-box simulation secure multiparty computation
2009/3/12
The standard class of adversaries considered in cryptography is that of strict polynomial-time
probabilistic machines. However, expected polynomial-time machines are often also considered.
For examp...
On the Relationships Between Notions of Simulation-Based Security
simulation-based security universal composability reactive simulatability
2008/11/19
Several compositional forms of simulation-based security have been proposed in the literature,
including universal composability, black-box simulatability, and variants thereof. These
relations betw...
Simulation-Based Security with Inexhaustible Interactive Turing Machines
Simulation-Based Security Interactive Turing Machines
2008/11/18
Recently, there has been much interest in extending models
for simulation-based security in such a way that the runtime of protocols
may depend on the length of their input. Finding such extensions ...
On the Role of Scheduling in Simulation-Based Security
Scheduling Simulation-Based Security
2008/9/9
In a series of papers, K¨usters et al. investigated the relationships
between various notions of simulation-based security. Two main
factors, the placement of a “master process” and the existence of...