On the (Non-)Equivalence of UC Security Notions
From MaRDI portal
Publication:5200576
DOI10.1007/978-3-642-33272-2_8zbMATH Open1303.94108OpenAlexW193924916MaRDI QIDQ5200576
Publication date: 6 November 2012
Published in: Provable Security (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-33272-2_8
Game theory (91A99) Cryptography (94A60) Network protocols (68M12) Authentication, digital signatures and secret sharing (94A62)
Related Items (2)
Adaptive versus Static Security in the UC Model โฎ Relationship of Three Cryptographic Channels in the UC Framework
Recommendations
- On the semantics of Alice \& Bob specifications of security protocols ๐ ๐
- Security definitions for hash functions: combining UCE and indifferentiability ๐ ๐
- A decidable class of security protocols for both reachability and equivalence properties ๐ ๐
- The Hitchhiker's guide to decidability and complexity of equivalence properties in security protocols ๐ ๐
- A new approach for UC security concurrent deniable authentication ๐ ๐
- Analysis and Improvement of Lindellโs UC-Secure Commitment Schemes ๐ ๐
- All-But-Many Encryption ๐ ๐
- On the power of nonuniformity in proofs of security ๐ ๐
- Equivalence of Uniform Key Agreement and Composition Insecurity ๐ ๐
- Equivalence between Semantic Security and Indistinguishability against Chosen Ciphertext Attacks ๐ ๐
This page was built for publication: On the (Non-)Equivalence of UC Security Notions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5200576)