搜索结果: 1-9 共查到“军事学 universally composable security”相关记录9条 . 查询时间(0.031 秒)
EasyUC: Using EasyCrypt to Mechanize Proofs of Universally Composable Security
universally composable security formal verification EasyCrypt
font style='font-size:12px;'>
2019/5/31
We present a methodology for using the EasyCrypt proof assistant (originally designed for mechanizing the generation of proofs of game-based security of cryptographic schemes and protocols) to mechani...
On the Universally Composable Security of OpenStack
Modular Security Analysis Universal Composability Cloud Security
font style='font-size:12px;'>
2018/6/19
OpenStack is the prevalent open-source, non-proprietary package for managing cloud services and data centers. It is highly complex and consists of multiple inter-related components which are developed...
A Simpler Variant of Universally Composable Security for Standard Multiparty Computation
universal composability secure multiparty computation definitions
font style='font-size:12px;'>
2016/1/8
In this paper, we present a simpler and more restricted variant of the universally composable
security (UC) framework that is suitable for “standard” two-party and multiparty computation
tasks. Many...
On Black-Box Complexity of Universally Composable Security in the CRS model
UC Secure Computation Black-Box Constructions Oblivious Transfer
font style='font-size:12px;'>
2015/12/30
In this work, we study the intrinsic complexity of black-box Universally Composable (UC) secure computation based on general assumptions. We present a thorough study in various corruption modelings wh...
Universally Composable Security Analysis of OAuth v2.0
OAuth UC SSL TLS Delegation Password-based Key Exchange
font style='font-size:12px;'>
2012/3/26
This paper defines an ideal functionality for delegation of web access to a third-party where the authentication mechanism is password-based. We give a universally-composable (UC) realization of this ...
Universally Composable Security Analysis of TLS--Secure Sessions with Handshake and Record Layer Protocols
Universal Composability TLS/SSL key exchange
font style='font-size:12px;'>
2009/6/5
We present a security analysis of the complete TLS protocol in the Universal Composable
security framework. This analysis evaluates the composition of key exchange functionalities
realized by the TL...
Obtaining Universally Composable Security:Towards the Bare Bones of Trust
Universally Composable Security Bare Bones Trust
font style='font-size:12px;'>
2009/6/2
A desirable goal for cryptographic protocols is to guarantee security when the protocol is composed
with other protocol instances. Universally Composable (UC) security provides this guarantee in a st...
Universally Composable Security with Global Setup
Universally Composable Security Global Setup
font style='font-size:12px;'>
2009/1/4
Cryptographic protocols are often designed and analyzed under some trusted setup assumptions,
namely in settings where the participants have access to global information that is trusted
to have some...
Obtaining Universally Composable Security:Towards the Bare Bones of Trust
Universally Composable Security Bare Bones of Trust
font style='font-size:12px;'>
2008/5/20
A desirable goal for cryptographic protocols is to guarantee security when the protocol is composedwith other protocol instances. Universally Composable (UC) security provides this guarantee in a stro...