Sciweavers

22 search results - page 5 / 5
» A Note on Universal Composable Zero Knowledge in Common Refe...
Sort
View
CRYPTO
2005
Springer
125views Cryptology» more  CRYPTO 2005»
15 years 8 months ago
Secure Computation Without Authentication
In the setting of secure multiparty computation, a set of parties wish to jointly compute some function of their inputs. Such a computation must preserve certain security propertie...
Boaz Barak, Ran Canetti, Yehuda Lindell, Rafael Pa...
CRYPTO
2010
Springer
171views Cryptology» more  CRYPTO 2010»
15 years 3 months ago
Credential Authenticated Identification and Key Exchange
Secure two-party authentication and key exchange are fundamental problems. Traditionally, the parties authenticate each other by means of their identities, using a public-key infr...
Jan Camenisch, Nathalie Casati, Thomas Groß,...