搜索结果: 1-9 共查到“军队指挥学 universally composable security”相关记录9条 . 查询时间(0.084 秒)
EasyUC: Using EasyCrypt to Mechanize Proofs of Universally Composable Security
universally composable security formal verification EasyCrypt
2019/5/31
We present a methodology for using the EasyCrypt proof assistant (originally designed for mechanizing the generation of proofs of game-based security of cryptographic schemes and protocols) to mechani...
On the Universally Composable Security of OpenStack
Modular Security Analysis Universal Composability Cloud Security
2018/6/19
OpenStack is the prevalent open-source, non-proprietary package for managing cloud services and data centers. It is highly complex and consists of multiple inter-related components which are developed...
A Simpler Variant of Universally Composable Security for Standard Multiparty Computation
universal composability secure multiparty computation definitions
2016/1/8
In this paper, we present a simpler and more restricted variant of the universally composable
security (UC) framework that is suitable for “standard” two-party and multiparty computation
tasks. Many...
On Black-Box Complexity of Universally Composable Security in the CRS model
UC Secure Computation Black-Box Constructions Oblivious Transfer
2015/12/30
In this work, we study the intrinsic complexity of black-box Universally Composable (UC) secure computation based on general assumptions. We present a thorough study in various corruption modelings wh...
Universally Composable Security Analysis of OAuth v2.0
OAuth UC SSL TLS Delegation Password-based Key Exchange
2012/3/26
This paper defines an ideal functionality for delegation of web access to a third-party where the authentication mechanism is password-based. We give a universally-composable (UC) realization of this ...
Universally Composable Security Analysis of TLS--Secure Sessions with Handshake and Record Layer Protocols
Universal Composability TLS/SSL key exchange
2009/6/5
We present a security analysis of the complete TLS protocol in the Universal Composable
security framework. This analysis evaluates the composition of key exchange functionalities
realized by the TL...
Obtaining Universally Composable Security:Towards the Bare Bones of Trust
Universally Composable Security Bare Bones Trust
2009/6/2
A desirable goal for cryptographic protocols is to guarantee security when the protocol is composed
with other protocol instances. Universally Composable (UC) security provides this guarantee in a st...
Universally Composable Security with Global Setup
Universally Composable Security Global Setup
2009/1/4
Cryptographic protocols are often designed and analyzed under some trusted setup assumptions,
namely in settings where the participants have access to global information that is trusted
to have some...
Obtaining Universally Composable Security:Towards the Bare Bones of Trust
Universally Composable Security Bare Bones of Trust
2008/5/20
A desirable goal for cryptographic protocols is to guarantee security when the protocol is composedwith other protocol instances. Universally Composable (UC) security provides this guarantee in a stro...