UC-secure cryptographic reverse firewall-guarding corrupted systems with the minimum trusted module
From MaRDI portal
Publication:2151289
DOI10.1007/978-3-030-88323-2_5zbMath1492.94140OpenAlexW3206780001MaRDI QIDQ2151289
Yanting Zhang, Geng Li, Jian-wei Liu, Zong-yang Zhang
Publication date: 1 July 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-88323-2_5
cryptographic reverse firewallPost-Snowden cryptographysecurity implementationsubversion attackuniversal composition
Uses Software
Cites Work
- Unnamed Item
- Public immunization against complete subversion without random oracles
- GNUC: a new universal composability framework
- Message Transmission with Reverse Firewalls—Secure Communication on Corrupted Machines
- Security of Symmetric Encryption against Mass Surveillance
- A More Cautious Approach to Security Against Mass Surveillance
- Cryptographic Reverse Firewalls
- Cliptography: Clipping the Power of Kleptographic Attacks
- Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions
- The Dark Side of “Black-Box” Cryptography or: Should We Trust Capstone?
- Universally Composable Security with Global Setup
- Advances in Cryptology - CRYPTO 2003
- Topics in Cryptology – CT-RSA 2005
This page was built for publication: UC-secure cryptographic reverse firewall-guarding corrupted systems with the minimum trusted module