搜索结果: 1-14 共查到“军队指挥学 Composable Security”相关记录14条 . 查询时间(0.072 秒)
A Composable Security Treatment of the Lightning Network
blockchain scalability universal composition
2019/7/10
The high latency and low throughput of blockchain protocols constitute one of the fundamental barriers for their wider adoption.Overlay protocols, notably the lightning network, have been touted asthe...
EasyUC: Using EasyCrypt to Mechanize Proofs of Universally Composable Security
universally composable security formal verification EasyCrypt
2019/5/31
We present a methodology for using the EasyCrypt proof assistant (originally designed for mechanizing the generation of proofs of game-based security of cryptographic schemes and protocols) to mechani...
On the Universally Composable Security of OpenStack
Modular Security Analysis Universal Composability Cloud Security
2018/6/19
OpenStack is the prevalent open-source, non-proprietary package for managing cloud services and data centers. It is highly complex and consists of multiple inter-related components which are developed...
A digital signature scheme (DSS), which consists of a key-generation, a signing, and a verification algorithm, is an invaluable tool in cryptography. The first and still most widely used security defi...
Concurrently Composable Security With Shielded Super-polynomial Simulators
universal composability protocol design cryptographic security proofs
2016/12/7
We propose a new framework for concurrently composable security that relaxes the security notion of UC security. As in previous frameworks, our notion is based on the idea of providing the simulator w...
A Simpler Variant of Universally Composable Security for Standard Multiparty Computation
universal composability secure multiparty computation definitions
2016/1/8
In this paper, we present a simpler and more restricted variant of the universally composable
security (UC) framework that is suitable for “standard” two-party and multiparty computation
tasks. Many...
On Black-Box Complexity of Universally Composable Security in the CRS model
UC Secure Computation Black-Box Constructions Oblivious Transfer
2015/12/30
In this work, we study the intrinsic complexity of black-box Universally Composable (UC) secure computation based on general assumptions. We present a thorough study in various corruption modelings wh...
Key Exchange with Unilateral Authentication: Composable Security Definition and Modular Protocol Design
key exchange constructive cryptography
2014/3/10
Key exchange with unilateral authentication (short: unilateral key exchange) is an important primitive in practical security protocols; a prime example is the widely deployed TLS protocol, which is us...
Universally Composable Security Analysis of OAuth v2.0
OAuth UC SSL TLS Delegation Password-based Key Exchange
2012/3/26
This paper defines an ideal functionality for delegation of web access to a third-party where the authentication mechanism is password-based. We give a universally-composable (UC) realization of this ...
Universally Composable Security Analysis of TLS--Secure Sessions with Handshake and Record Layer Protocols
Universal Composability TLS/SSL key exchange
2009/6/5
We present a security analysis of the complete TLS protocol in the Universal Composable
security framework. This analysis evaluates the composition of key exchange functionalities
realized by the TL...
Obtaining Universally Composable Security:Towards the Bare Bones of Trust
Universally Composable Security Bare Bones Trust
2009/6/2
A desirable goal for cryptographic protocols is to guarantee security when the protocol is composed
with other protocol instances. Universally Composable (UC) security provides this guarantee in a st...
On Universal Composable Security of Time-Stamping Protocols
time-stamping protocol universal composable security
2009/2/8
Time-stamping protocols, which assure that a document was
existed at a certain time, are applied to some useful and practical applications
such as electronic patent applications and so on. There are...
Universally Composable Security with Global Setup
Universally Composable Security Global Setup
2009/1/4
Cryptographic protocols are often designed and analyzed under some trusted setup assumptions,
namely in settings where the participants have access to global information that is trusted
to have some...
Obtaining Universally Composable Security:Towards the Bare Bones of Trust
Universally Composable Security Bare Bones of Trust
2008/5/20
A desirable goal for cryptographic protocols is to guarantee security when the protocol is composedwith other protocol instances. Universally Composable (UC) security provides this guarantee in a stro...