搜索结果: 1-4 共查到“军事学 UC-security”相关记录4条 . 查询时间(0.046 秒)
Practical UC security with a Global Random Oracle
Efficient Secure 2PC UC-security Global Random Oracle
font style='font-size:12px;'>
2016/1/6
We show that there exist commitment, zero-knowledge and general function evaluation protocols with universally composable security, in a model where all parties and all protocols have access to a sing...
On the (Non-) Equivalence of UC Security Notions
weak security 1-bit specialized simulator UC security time-lock puzzles game theory
font style='font-size:12px;'>
2012/3/27
In this work we investigate the relations among various security notions and show their connection with the game-theoretic notion of strong universal implementation. More precisely, we present a separ...
Comparing UC Security Variants
weak security composability 1-bit specialized simulator UC security
font style='font-size:12px;'>
2011/7/25
In this work we investigate the relations among various security notions. More precisely, we present a separation result between two variants of UC security defi nition: 1-bit specialized simulator UC...
Equivocal Blind Signatures and Adaptive UC-Security
Equivocal Blind Signatures Adaptive UC-Security
font style='font-size:12px;'>
2008/9/4
We study the design of practical blind signatures in the universal composability (UC) setting against adaptive adversaries. We introduce a new property for blind signature schemes that is fundamental ...