搜索结果: 1-6 共查到“军事学 Concurrent secure computation”相关记录6条 . 查询时间(0.083 秒)
A New Approach to Black-Box Concurrent Secure Computation
black-box construction concurrent security multi-party computation
2018/3/7
We consider the task of constructing concurrently composable protocols for general secure computation by making only black-box use of underlying cryptographic primitives. Existing approaches for this ...
Concurrent Secure Computation with Optimal Query Complexity
secure computation concurrent security
2015/12/29
The multiple ideal query (MIQ) model [Goyal, Jain, and Ostrovsky, Crypto’10] offers a
relaxed notion of security for concurrent secure computation, where the simulator is allowed to
query the ideal ...
Concurrent Secure Computation via Non-Black Box Simulation
Concurrent secure computation concurrent secure blind signatures
2015/12/21
We give first positive results for concurrent blind signatures and verifiable random functions
in the plain model as per the ideal/real world security definition. Our positive result is
somewhat sur...
Adaptive and Concurrent Secure Computation from New Notions of Non-Malleability
foundations / non-malleability adaptive adversaries UC-security
2012/6/14
We present a unified framework for obtaining general secure computation that achieves adaptive- Universally Composable (UC)-security. Our framework captures essentially all previous results on adaptiv...
Adaptive and Concurrent Secure Computation from New Notions of Non-Malleability
foundations / non-malleability adaptive adversaries UC-security
2012/3/22
We present a unified framework for obtaining general secure computation that achieves adaptive- Universally Composable (UC)-security. Our framework captures essentially all previous results on adaptiv...
Adaptive and Concurrent Secure Computation from New Notions of Non-Malleability
foundations / non-malleability adaptive adversaries UC-security
2012/3/21
We present a unified framework for obtaining general secure computation that achieves adaptive- Universally Composable (UC)-security. Our framework captures essentially all previous results on adaptiv...