搜索结果: 1-4 共查到“军队指挥学 Universally composable secure”相关记录4条 . 查询时间(0.078 秒)
Universally Composable Secure Two and Multi-party Computation in the Corruptible Tamper-Proof Hardware Token Model
tamper-proof token corruptible setup assumption
2017/11/13
In this work we introduce the corruptible token model. This model generalizes the stateless tamper-proof token model introduced by Katz (EUROCRYPT '07) and relaxes the trust assumption. Our improved m...
From Input Private to Universally Composable Secure Multiparty Computation Primitives
secure multiparty computation universal composability
2016/1/25
Secure multi-party computation systems are commonly built from a small set of primitive
components. The composability of security notions has a central role in the analysis of such
systems, as it al...
Universally Composable secure TNC protocol based on IF-T binding to TLS
Trusted Network Connect SKAE TLS
2016/1/9
Trusted Network Connect (TNC) requires both user authentication and integrity
validation of an endpoint before it connects to the internet or accesses some web service.
However, as the user authenti...
Universally Composable Secure Group Communication
Universally composable secure Secure group communication
2016/1/7
This paper analyzes group communication within the universally composable
framework. We first propose the group communication model, identity-based signcrytion model
and group key distribution model...