搜索结果: 1-15 共查到“军队指挥学 Universally composable”相关记录80条 . 查询时间(0.093 秒)
Ouroboros Clepsydra: Ouroboros Praos in the Universally Composable Relative Time Model
proof of stake blockchain UC model
2019/8/19
Ouroboros Praos is a proof of stake based blockchain protocol. One of its security assumptions is parties are synchronized i.e., all of them knows when the protocol passes a new state. However, it is ...
A Framework for Universally Composable Oblivious Transfer from One-Round Key-Exchange
Oblivious transfer universal composability key exchange
2019/6/21
Oblivious transfer is one of the main pillars of modern cryptography and plays a major role as a building block for other more complex cryptographic primitives. In this work, we present an efficient a...
EasyUC: Using EasyCrypt to Mechanize Proofs of Universally Composable Security
universally composable security formal verification EasyCrypt
2019/5/31
We present a methodology for using the EasyCrypt proof assistant (originally designed for mechanizing the generation of proofs of game-based security of cryptographic schemes and protocols) to mechani...
Accumulators, first introduced by Benaloh and de Mare (Eurocrypt 1993), are compact representations of arbitrarily large sets and can be used to prove claims of membership or non-membership about the ...
Universally Composable Oblivious Transfer Protocol based on the RLWE Assumption
cryptographic protocols oblivious transfer
2018/12/3
We use an RLWE-based key exchange scheme to construct a simple and efficient post-quantum oblivious transfer based on the Ring Learning with Errors assumption. We prove that our protocol is secure in ...
Simulatable Channels: Extended Security that is Universally Composable and Easier to Prove
Secure Channels Ciphertext Fragmentation Universal Composability
2018/11/16
Ever since the foundational work of Goldwasser and Micali, simulation has proven to be a powerful and versatile construct for formulating security in various areas of cryptography. However security de...
A Universally Composable Framework for the Privacy of Email Ecosystems
universal composability anonymous communications email
2018/11/16
Email communication is amongst the most prominent online activities, and as such, can put sensitive information at risk. It is thus of high importance that internet email applications are designed in ...
On the Universally Composable Security of OpenStack
Modular Security Analysis Universal Composability Cloud Security
2018/6/19
OpenStack is the prevalent open-source, non-proprietary package for managing cloud services and data centers. It is highly complex and consists of multiple inter-related components which are developed...
ROYALE: A Framework for Universally Composable Card Games with Financial Rewards and Penalties Enforcement
Poker Card Games Fairness Blockchain
2018/3/7
While many tailor made card game protocols are known, the vast majority of those suffer from three main issues: lack of mechanisms for distributing financial rewards and punishing cheaters, lack of co...
Practical, Anonymous, and Publicly Linkable Universally-Composable Reputation Systems
Reputation Trust Anonymity
2018/1/11
We consider reputation systems in the Universal Composability Framework where users can anonymously rate each others products that they purchased previously. To obtain trustworthy, reliable, and hones...
The security of almost any real-world distributed system today depends on the participants having some "reasonably accurate" sense of current real time. Indeed, to name one example, the very authentic...
Efficient, Round-optimal, Universally-Composable Oblivious Transfer and Commitment Scheme with Adaptive Security
Oblivious Transfer Commitment Schemes Universal Composability
2017/12/1
Adaptive security embodies one of the strongest notions of security that allows an adversary to corrupt parties at any point during protocol execution and gain access to its internal state. Since it m...
Universally Composable Secure Two and Multi-party Computation in the Corruptible Tamper-Proof Hardware Token Model
tamper-proof token corruptible setup assumption
2017/11/13
In this work we introduce the corruptible token model. This model generalizes the stateless tamper-proof token model introduced by Katz (EUROCRYPT '07) and relaxes the trust assumption. Our improved m...
Efficient and Universally Composable Protocols for Oblivious Transfer from the CDH Assumption
Oblivious Transfer Universally Composable Security
2017/10/16
Oblivious Transfer (OT) is a simple, yet fundamental primitive which suffices to achieve almost every cryptographic application. In a recent work (Latincrypt `15), Chou and Orlandi (CO) present the mo...
Since its introduction the UC framework by Canetti has received a lot of attention. A contributing factor to its popularity is that it allows to capture a large number of common cryptographic primitiv...