Sciweavers

1288 search results - page 60 / 258
» Securing aspect composition
Sort
View
CRYPTO
2003
Springer
93views Cryptology» more  CRYPTO 2003»
14 years 2 months ago
Universal Composition with Joint State
Abstract. Cryptographic systems often involve running multiple concurrent instances of some protocol, where the instances have some amount of joint state and randomness. (Examples ...
Ran Canetti, Tal Rabin
CHI
2009
ACM
14 years 9 months ago
A material focus: exploring properties of computational composites
In this paper we build on the notion of computational composites, which hold a material perspective on computational technology. We argue that a focus on the material aspects of t...
Anna Vallgårda, Tomas Sokoler
CRYPTO
2009
Springer
144views Cryptology» more  CRYPTO 2009»
14 years 3 months ago
On the Composition of Public-Coin Zero-Knowledge Protocols
Abstract. We show that only languages in BPP have public-coin, blackbox zero-knowledge protocols that are secure under an unbounded (polynomial) number of parallel repetitions. Thi...
Rafael Pass, Wei-Lung Dustin Tseng, Douglas Wikstr...
ICSE
2009
IEEE-ACM
13 years 6 months ago
Slede: Framework for automatic verification of sensor network security protocol implementations
Verifying security properties of protocols requires developers to manually create protocol-specific intruder models, which could be tedious and error prone. We present Slede, a ve...
Youssef Hanna, Hridesh Rajan
IACR
2011
147views more  IACR 2011»
12 years 8 months ago
Adaptive Security of Concurrent Non-Malleable Zero-Knowledge
A zero-knowledge protocol allows a prover to convince a verifier of the correctness of a statement without disclosing any other information to the verifier. It is a basic tool a...
Zhenfu Cao, Zongyang Zhang, Yunlei Zhao