Computational indistinguishability

Results: 24



#Item
1Cryptography / Secret sharing / Public-key cryptography / Proactive secret sharing / Commitment scheme / Ciphertext indistinguishability / Adversary model / Digital signature / Encryption / Information-theoretic security

The proceedings version of this paper appears in ACM CCSThis is the full version of that paper. Robust Computational Secret Sharing and a Unified Account of Classical Secret-Sharing Goals Mihir Bellare∗

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2007-08-20 03:37:31
2

Electronic Colloquium on Computational Complexity, Report NoBounded Indistinguishability and the Complexity of Recovering Secrets Andrej Bogdanov∗

Add to Reading List

Source URL: www.ccs.neu.edu

Language: English - Date: 2016-05-09 15:42:34
    3

    Computational Indistinguishability Logics Bruce M. Kapron Computer Science Department University of Victoria June 27, 2009

    Add to Reading List

    Source URL: www-mitacs2009.imag.fr

    Language: English - Date: 2009-06-27 05:32:44
      4Cryptography / Authentication protocols / Computer network security / Ciphertext indistinguishability / DolevYao model / Advantage / Kerberos / Cryptographic protocol / Security parameter / XTR / Challengeresponse authentication / Security protocol notation

      Inductive Proof Method for Computational Secrecy Arnab Roy, Anupam Datta, Ante Derek, John C. Mitchell Department of Computer Science, Stanford University Abstract. We investigate inductive methods for proving secrecy p

      Add to Reading List

      Source URL: seclab.stanford.edu

      Language: English - Date: 2010-07-17 01:14:15
      5Secure two-party computation / Zero-knowledge proof / Commitment scheme / Oblivious transfer / Computational indistinguishability / Oded Goldreich / Ciphertext indistinguishability / Man-in-the-middle attack / Cryptography / Cryptographic protocols / Secure multi-party computation

      Efficient Secure Two-Party Protocols: Techniques and Constructions

      Add to Reading List

      Source URL: www.eng.biu.ac.il

      Language: English - Date: 2014-09-16 07:30:08
      6Computational hardness assumption / Ciphertext indistinguishability / Computer security / Cyberwarfare / Science / Cryptography / Cryptographic primitive / Information-theoretic security

      Proving Computational Security with a General-Purpose C Verifier A 5-Minute Talk Fran¸cois Dupressoir The Open University

      Add to Reading List

      Source URL: csf2012.seas.harvard.edu

      Language: English - Date: 2012-07-05 18:15:11
      7

      Computational Indistinguishability Amplification: Tight Product Theorems for System Composition Ueli Maurer Stefano Tessaro

      Add to Reading List

      Source URL: www.iacr.org

      Language: English - Date: 2009-09-22 18:44:16
        8ElGamal encryption / Public-key cryptography / Ciphertext indistinguishability / Diffie–Hellman problem / Decisional Diffie–Hellman assumption / Optimal asymmetric encryption padding / Cramer–Shoup cryptosystem / Cryptography / Computational hardness assumptions / Finite fields

        Formal Certification of Code-Based Cryptographic Proofs GILLES BARTHE and SANTIAGO ZANELLA BEGUELIN IMDEA Software, Madrid, Spain and BENJAMIN GREGOIRE

        Add to Reading List

        Source URL: certicrypt.gforge.inria.fr

        Language: English - Date: 2013-06-17 13:32:36
        9Public-key cryptography / Digital signature / Key management / Notary / Ciphertext indistinguishability / Computational complexity theory / Reduction / Security parameter / RSA / Cryptography / Theoretical computer science / Applied mathematics

        On the Impossibility of Tight Cryptographic Reductions Christoph Bader, Tibor Jager, Yong Li, and Sven Sch¨age Horst G¨ortz Institute for IT Security, Ruhr-University Bochum, Germany {christoph.bader, tibor.jager, yong

        Add to Reading List

        Source URL: eprint.iacr.org

        Language: English - Date: 2015-04-27 06:52:51
        10Needham–Schroeder protocol / Ciphertext indistinguishability / Kerberos / Advantage / XTR / Ticket Granting Ticket / Cryptography / Cryptographic protocols / Computer network security

        Inductive Proofs of Computational Secrecy ? Arnab Roy1 , Anupam Datta2 , Ante Derek1 , John C. Mitchell1 1

        Add to Reading List

        Source URL: theory.stanford.edu

        Language: English - Date: 2007-12-18 00:17:14
        UPDATE