Sciweavers

370 search results - page 25 / 74
» Limits of Constructive Security Proofs
Sort
View
ESORICS
2008
Springer
13 years 10 months ago
Code-Carrying Authorization
In authorization, there is often a wish to shift the burden of proof to those making requests, since they may have more resources and more specific knowledge to construct the requi...
Sergio Maffeis, Martín Abadi, Cédric...
ICTCS
2005
Springer
14 years 1 months ago
A Typed Assembly Language for Non-interference
Abstract. Non-interference is a desirable property of systems in a multilevel security architecture, stating that confidential information is not disclosed in public output. The c...
Ricardo Medel, Adriana B. Compagnoni, Eduardo Bone...
JSW
2008
101views more  JSW 2008»
13 years 8 months ago
Broadcast Authentication with Practically Unbounded One-way Chains
A protocol for assuring the authenticity of information broadcasted over long periods of time is proposed. The protocol is based on time synchronization and uses one-way chains con...
Bogdan Groza
CCS
2007
ACM
14 years 2 months ago
Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing
We construct two new multiparty digital signature schemes that allow multiple signers to sequentially produce a compact, fixed-length signature. First, we introduce a new primiti...
Alexandra Boldyreva, Craig Gentry, Adam O'Neill, D...
FSE
2009
Springer
125views Cryptology» more  FSE 2009»
14 years 8 months ago
On the Security of Tandem-DM
Abstract. We provide the first proof of security for Tandem-DM, one of the oldest and most wellknown constructions for turning a blockcipher with n-bit blocklength and 2n-bit keyle...
Ewan Fleischmann, Michael Gorski, Stefan Lucks