Security of Auditing Protocols Against Subversion Attacks
From MaRDI portal
Publication:5859735
DOI10.1142/S0129054120500033zbMath1458.94265OpenAlexW3012318959WikidataQ114978629 ScholiaQ114978629MaRDI QIDQ5859735
Jinshu Su, Rongmao Chen, Wen-Jun Wu, Jiaxian Lv, Yi Wang
Publication date: 20 April 2021
Published in: International Journal of Foundations of Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1142/s0129054120500033
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Network protocols (68M12)
Cites Work
- Unnamed Item
- Asymmetric subversion attacks on signature schemes
- Security of Symmetric Encryption against Mass Surveillance
- Cryptographic Reverse Firewalls
- The Dark Side of “Black-Box” Cryptography or: Should We Trust Capstone?
- Compact Proofs of Retrievability
- An Efficient Probabilistic Public-Key Encryption Scheme Which Hides All Partial Information
- A Public-Key Encryption Scheme with Pseudo-random Ciphertexts
This page was built for publication: Security of Auditing Protocols Against Subversion Attacks