Back to Results
First PageMeta Content
Advantage / Cryptographic protocol / Cipher / XTR / Cryptography / Ciphertext indistinguishability / Semantic security


Inductive Trace Properties for Computational Security Arnab Roy, Anupam Datta, Ante Derek, John C. Mitchell Department of Computer Science, Stanford University Abstract. Protocol authentication properties are generally
Add to Reading List

Document Date: 2007-12-18 00:33:31


Open Document

File Size: 162,91 KB

Share Result on Facebook

IndustryTerm

non-interactive algorithm / generation protocol / noncegeneration algorithm / secretive protocol / secretive protocols / /

Organization

John C. Mitchell Department of Computer Science / IND-CCA / Stanford University / LoR / /

Person

Anupam Datta / John C. Mitchell / /

Position

IND-CPA / standard IND-CPA / /

Technology

encryption / 3 Secretive Protocols / same key generation protocol / application protocols / key distribution protocols / secretive protocols / 2 2.1 Computational Model Modeling Protocols / simulation / same protocol / application protocol / SSL / key exchange protocol / non-interactive algorithm / key exchange protocols / secretive protocol / noncegeneration algorithm / accomplished using a key exchange protocol / /

SocialTag