Joint state composition theorems for public-key encryption and digital signature functionalities with local computation
From MaRDI portal
Publication:2210436
DOI10.1007/s00145-020-09353-0zbMath1453.94094OpenAlexW3029169547WikidataQ121889505 ScholiaQ121889505MaRDI QIDQ2210436
Daniel Rausch, Max Tuengerthal, Ralf Küsters
Publication date: 6 November 2020
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-020-09353-0
digital signaturespublic-key encryptionuniversal composabilityIITM modelideal functionalitiesjoint state composition
Related Items
Embedding the UC model into the IITM model ⋮ Challenges in the Automated Verification of Security Protocols
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Subtleties in the definition of IND-CCA: when and how should challenge decryption be disallowed?
- GNUC: a new universal composability framework
- Universal Composition with Responsive Environments
- Time-Bounded Task-PIOAs: A Framework for Analyzing Security Protocols
- Universally Composable Security with Global Setup
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
- Advances in Cryptology - CRYPTO 2003
- Advances in Cryptology - CRYPTO 2003
- Information Security
- Theory of Cryptography
- Theory of Cryptography