Sciweavers

352 search results - page 10 / 71
» Adaptively Secure Multi-Party Computation
Sort
View
TCC
2005
Springer
163views Cryptology» more  TCC 2005»
14 years 1 months ago
Adaptive Security of Symbolic Encryption
Abstract. We prove a computational soundness theorem for the symbolic analysis of cryptographic protocols which extends an analogous theorem of Abadi and Rogaway (J. of Cryptology ...
Daniele Micciancio, Saurabh Panjwani
IEEEIAS
2008
IEEE
14 years 2 months ago
Adaptive Dynamic Reaction to Automotive IT Security Incidents Using Multimedia Car Environment
Modern cars offer an increasingly powerful Multimedia environment. While also the potential for an application as Human Computer Interface (HCI) is growing, in this paper we conce...
Tobias Hoppe, Stefan Kiltz, Jana Dittmann
ATC
2007
Springer
13 years 12 months ago
Design of Service-Based Systems with Adaptive Tradeoff Between Security and Service Delay
Service-based Systems (SBS) have the advantage of composing distributed systems from various services provided by multiple providers transparently. In addition to functional correc...
Stephen S. Yau, Min Yan, Dazhi Huang
FOCS
1999
IEEE
14 years 4 days ago
Non-Malleable Non-Interactive Zero Knowledge and Adaptive Chosen-Ciphertext Security
We introduce the notion of non-malleable noninteractive zero-knowledge (NIZK) proof systems. We show how to transform any ordinary NIZK proof system into one that has strong non-m...
Amit Sahai
PKC
2009
Springer
164views Cryptology» more  PKC 2009»
14 years 8 months ago
Asynchronous Multiparty Computation: Theory and Implementation
Abstract. We propose an asynchronous protocol for general multiparty computation with perfect security and communication complexity O(n2 |C|k) where n is the number of parties, |C|...
Ivan Damgård, Jesper Buus Nielsen, Martin Ge...