Embedding the UC model into the IITM model
From MaRDI portal
Publication:2170048
DOI10.1007/978-3-031-07085-3_9zbMath1497.94113OpenAlexW4285232599MaRDI QIDQ2170048
Ralf Küsters, Céline Chevalier, Daniel Rausch
Publication date: 30 August 2022
Full work available at URL: https://doi.org/10.1007/978-3-031-07085-3_9
Uses Software
Cites Work
- On the relationships between notions of simulation-based security
- Universal composition with global subroutines: capturing global setup within plain UC
- iUC: flexible universal composability made simple
- The IITM model: a simple and expressive model for universal composability
- Joint state composition theorems for public-key encryption and digital signature functionalities with local computation
- Polynomial runtime and composability
- GNUC: a new universal composability framework
- Universal Composition with Responsive Environments
- Ideal Key Derivation and Encryption in Simulation-Based Security
- Constructive Cryptography – A Primer
- Universally Composable Security with Global Setup
- Universally Composable Security
- Advances in Cryptology - CRYPTO 2003
This page was built for publication: Embedding the UC model into the IITM model