Advances in Cryptology - CRYPTO 2003

From MaRDI portal
Publication:5428125

DOI10.1007/b11817zbMath1122.94360OpenAlexW2480001466WikidataQ56235047 ScholiaQ56235047MaRDI QIDQ5428125

Tal Rabin, Ran Canetti

Publication date: 28 November 2007

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/b11817




Related Items (42)

A probabilistic polynomial-time process calculus for the analysis of cryptographic protocolsSmooth NIZK argumentsComposable Security in the Tamper-Proof Hardware Model Under Minimal ComplexityUC-secure and Contributory Password-Authenticated Group Key ExchangeUC-secure cryptographic reverse firewall-guarding corrupted systems with the minimum trusted moduleEmbedding the UC model into the IITM modelLong-term security and universal composabilityUC priced oblivious transfer with purchase statistics and dynamic pricingA new framework for deniable secure key exchangeA universal composability framework for analysis of proxy threshold signatureSecurity Analysis of CPaceA new security notion for PKC in the standard model: weaker, simpler, and still realizing secure channels(Public) verifiability for composable protocols without adaptivity or zero-knowledgeUniversally composable symbolic security analysisEnvironmentally friendly composable multi-party computation in the plain model from standard (timed) assumptionsOn the (Ir)replaceability of global setups, or how (not) to use a global ledgerThe IITM model: a simple and expressive model for universal composabilityJoint state composition theorems for public-key encryption and digital signature functionalities with local computationA Universally Composable Group Key Exchange Protocol with Minimum Communication EffortSecure computation without authenticationChallenges in the Automated Verification of Security ProtocolsEfficient UC-Secure Authenticated Key-Exchange for Algebraic LanguagesFormal Abstractions for Attested Execution Secure ProcessorsA Modular Security Analysis of the TLS Handshake ProtocolUniversally Composable Adaptive Oblivious TransferPrivate set-intersection with common set-upMulti-theorem preprocessing NIZKs from latticesRound-preserving parallel composition of probabilistic-termination cryptographic protocolsGNUC: a new universal composability frameworkContributory Password-Authenticated Group Key Exchange with Join CapabilityIdeal Key Derivation and Encryption in Simulation-Based SecurityLegally-Enforceable Fairness in Secure Two-Party ComputationEfficient Two-Party Password-Based Key Exchange Protocols in the UC FrameworkA note on universal composable zero-knowledge in the common reference string modelPassword-Authenticated Group Key Agreement with Adaptive Security and ContributivenessUniversally Composable Adaptive Priced Oblivious TransferSafely composing security protocolsProbabilistic termination and composability of cryptographic protocolsUniversally Composable Security Analysis of TLSRound Optimal Universally Composable Oblivious Transfer ProtocolsOrder-fairness for Byzantine consensusTwo-round oblivious transfer from CDH or LPN




This page was built for publication: Advances in Cryptology - CRYPTO 2003