Sciweavers

325 search results - page 12 / 65
» Concurrent Composition of Secure Protocols in the Timing Mod...
Sort
View
CCS
2001
ACM
14 years 1 months ago
Events in security protocols
The events of a security protocol and their causal dependency can play an important role in the analysis of security properties. This insight underlies both strand spaces and the ...
Federico Crazzolara, Glynn Winskel
CORR
2007
Springer
150views Education» more  CORR 2007»
13 years 8 months ago
Composable Security in the Bounded-Quantum-Storage Model
We give a new, simulation-based, definition for security in the bounded-quantum-storage model, and show that this definition allows for sequential composition of protocols. Damg...
Stephanie Wehner, Jürg Wullschleger
EUROCRYPT
2003
Springer
14 years 1 months ago
Resettable Zero-Knowledge in the Weak Public-Key Model
A new public-key model for resettable zero-knowledge (rZK) protocols, which is an extension and generalization of the upper-bounded public-key (UPK) model introduced by Micali and ...
Yunlei Zhao, Xiaotie Deng, Chan H. Lee, Hong Zhu
IFM
2000
Springer
104views Formal Methods» more  IFM 2000»
14 years 5 days ago
Structuring Real-Time Object-Z Specifications
This paper presents a means of structuring specifications in real-time Object-Z: an integration of Object-Z with the timed refinement calculus. Incremental modification of classes ...
Graeme Smith, Ian J. Hayes
TCC
2009
Springer
133views Cryptology» more  TCC 2009»
14 years 9 months ago
Composing Quantum Protocols in a Classical Environment
We propose a general security definition for cryptographic quantum protocols that implement classical non-reactive two-party tasks. The definition is expressed in terms of simple q...
Serge Fehr, Christian Schaffner