메뉴 건너뛰기




Volumn 4991 LNCS, Issue , 2008, Pages 361-376

Computational soundness of non-malleable commitments

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATIONAL METHODS; CRYPTOGRAPHY; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; MATHEMATICAL MODELS;

EID: 41549112982     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-79104-1_26     Document Type: Conference Paper
Times cited : (12)

References (26)
  • 1
    • 33646045378 scopus 로고    scopus 로고
    • Soundness of formal encryption in the presence of key-cycles
    • de Capitani di Vimercati, S, Syverson, P.F, Gollmann, D, eds, ESORICS 2005, Springer, Heidelberg
    • Adão, P., Bana, G., Herzog, J., Scedrov, A.: Soundness of formal encryption in the presence of key-cycles. In: de Capitani di Vimercati, S., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol. 3679, pp. 374-396. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3679 , pp. 374-396
    • Adão, P.1    Bana, G.2    Herzog, J.3    Scedrov, A.4
  • 2
    • 28144460109 scopus 로고    scopus 로고
    • Computational and information-theoretic soundness and completeness of formal encryption. In: CSFW
    • Los Alamitos
    • Adão, P., Bana, G., Scedrov, A.: Computational and information-theoretic soundness and completeness of formal encryption. In: CSFW 2005, pp. 170-184. IEEE Computer Society Press, Los Alamitos (2005)
    • (2005) 170-184. IEEE Computer Society Press , pp. 2005
    • Adão, P.1    Bana, G.2    Scedrov, A.3
  • 3
    • 33745790245 scopus 로고    scopus 로고
    • Guessing attacks and the computational soundness of static equivalence
    • Aceto, L, Ingólfsdóttir, A, eds, FOSSACS 2006 and ETAPS 2006, Springer, Heidelberg
    • Abadi, M., Baudet, M., Warinschi, B.: Guessing attacks and the computational soundness of static equivalence. In: Aceto, L., Ingólfsdóttir, A. (eds.) FOSSACS 2006 and ETAPS 2006. LNCS, vol. 3921, pp. 398-412. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.3921 , pp. 398-412
    • Abadi, M.1    Baudet, M.2    Warinschi, B.3
  • 4
    • 85083027758 scopus 로고    scopus 로고
    • Reconciling two views of cryptography (the computational soundness of formal encryption)
    • Abadi, M., Rogaway, P.: Reconciling two views of cryptography (the computational soundness of formal encryption). J. Cryptology 15(2), 103-127 (2002)
    • (2002) J. Cryptology , vol.15 , Issue.2 , pp. 103-127
    • Abadi, M.1    Rogaway, P.2
  • 6
    • 26444541858 scopus 로고    scopus 로고
    • Computationally sound implementations of equational theories against passive adversaries
    • Caires, L, Italiano, G.F, Monteiro, L, Palamidessi, C, Yung, M, eds, ICALP 2005, Springer, Heidelberg
    • Baudet, M., Cortier, V., Kremer, S.: Computationally sound implementations of equational theories against passive adversaries. In: Caires, L., Italiano, G.F., Monteiro, L., Palamidessi, C., Yung, M. (eds.) ICALP 2005. LNCS, vol. 3580, pp. 652-663. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3580 , pp. 652-663
    • Baudet, M.1    Cortier, V.2    Kremer, S.3
  • 7
    • 38049082991 scopus 로고    scopus 로고
    • A generalization of DDH with applications to protocol analysis and computational soundness
    • Menezes, A, ed, CRYPTO 2007, Springer, Heidelberg
    • Bresson, E., Lakhnech, Y., Mazaré, L., Warinschi, B.: A generalization of DDH with applications to protocol analysis and computational soundness. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4622
    • Bresson, E.1    Lakhnech, Y.2    Mazaré, L.3    Warinschi, B.4
  • 8
    • 33746041431 scopus 로고    scopus 로고
    • The security of triple encryption and a framework for code-based game-playing proofs
    • Vaudenay, S, ed, EUROCRYPT 2006, Springer, Heidelberg
    • Bellare, M., Rogaway, P.: The security of triple encryption and a framework for code-based game-playing proofs. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 409-426. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4004 , pp. 409-426
    • Bellare, M.1    Rogaway, P.2
  • 10
    • 84962447835 scopus 로고    scopus 로고
    • Computationally sound symbolic secrecy in the presence of hash functions
    • Arun-Kumar, S, Garg, N, eds, FSTTCS 2006, Springer, Heidelberg
    • Cortier, V., Kremer, S., Küsters, R., Warinschi, B.: Computationally sound symbolic secrecy in the presence of hash functions. In: Arun-Kumar, S., Garg, N. (eds.) FSTTCS 2006. LNCS, vol. 4337, pp. 176-187. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4337 , pp. 176-187
    • Cortier, V.1    Kremer, S.2    Küsters, R.3    Warinschi, B.4
  • 11
    • 84945133720 scopus 로고    scopus 로고
    • Efficient and non-interactive non-malleable commitment
    • Pfitzmann, B, ed, EUROCRYPT 2001, Springer, Heidelberg
    • Di Crescenzo, G., Katz, J., Ostrovsky, R., Smith, A.: Efficient and non-interactive non-malleable commitment. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 40-59. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2045 , pp. 40-59
    • Di Crescenzo, G.1    Katz, J.2    Ostrovsky, R.3    Smith, A.4
  • 13
    • 0022080529 scopus 로고
    • A randomizing protocol for signing contracts
    • Even, S., Goldreich, O., Lempel, A.: A randomizing protocol for signing contracts. Comm. ACM 28(6), 637-647 (1985)
    • (1985) Comm. ACM , vol.28 , Issue.6 , pp. 637-647
    • Even, S.1    Goldreich, O.2    Lempel, A.3
  • 14
    • 84983134965 scopus 로고    scopus 로고
    • Efficient non-malleable commitment schemes
    • Bellare, M, ed, CRYPTO 2000, Springer, Heidelberg
    • Fischlin, M., Fischlin, R.: Efficient non-malleable commitment schemes. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 413-431. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1880 , pp. 413-431
    • Fischlin, M.1    Fischlin, R.2
  • 16
    • 71149116146 scopus 로고
    • Proofs that yield nothing but their validity and a methodology of cryptographic protocol design
    • Goldreich, O., Micali, S., Wigderson, A.: Proofs that yield nothing but their validity and a methodology of cryptographic protocol design. J. ACM 38(1), 691-729 (1991)
    • (1991) J. ACM , vol.38 , Issue.1 , pp. 691-729
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 17
    • 33845272534 scopus 로고    scopus 로고
    • Garcia, F.D., van Rossum, P.: Sound computational interpretation of symbolic hashes in the standard model. In: Yoshiura, H., Sakurai, K., Rannenberg, K., Murayama, Y., Kawamura, S.-i. (eds.) IWSEC 2006. LNCS, 4266, pp. 33-47. Springer, Heidelberg (2006)
    • Garcia, F.D., van Rossum, P.: Sound computational interpretation of symbolic hashes in the standard model. In: Yoshiura, H., Sakurai, K., Rannenberg, K., Murayama, Y., Kawamura, S.-i. (eds.) IWSEC 2006. LNCS, vol. 4266, pp. 33-47. Springer, Heidelberg (2006)
  • 18
    • 18544364489 scopus 로고    scopus 로고
    • A computational interpretation of Dolev-Yao adversaries
    • Herzog, J.: A computational interpretation of Dolev-Yao adversaries. Theoretical Computer Science 340(1), 57-81 (2005)
    • (2005) Theoretical Computer Science , vol.340 , Issue.1 , pp. 57-81
    • Herzog, J.1
  • 19
    • 24644476184 scopus 로고    scopus 로고
    • Janvier, R., Lakhnech, Y., Mazar, L.: Completing the picture: Soundness of formal encryption in the presence of active adversaries. In: Sagiv, M. (ed.) ESOP 2005. LNCS, 3444, pp. 172-185. Springer, Heidelberg (2005)
    • Janvier, R., Lakhnech, Y., Mazar, L.: Completing the picture: Soundness of formal encryption in the presence of active adversaries. In: Sagiv, M. (ed.) ESOP 2005. LNCS, vol. 3444, pp. 172-185. Springer, Heidelberg (2005)
  • 20
    • 38049000874 scopus 로고    scopus 로고
    • Adaptive soundness of static equivalence
    • Biskup, J, López, J, eds, ESORICS 2007, Springer, Heidelberg
    • Kremer, S., Mazaré, L.: Adaptive soundness of static equivalence. In: Biskup, J., López, J. (eds.) ESORICS 2007. LNCS, vol. 4734, Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4734
    • Kremer, S.1    Mazaré, L.2
  • 21
    • 41549095024 scopus 로고    scopus 로고
    • Mazaré, L.: Computationally sound analysis of protocols using bilinear pairings. In: WITS 2007, pp. 6-21 (2007)
    • Mazaré, L.: Computationally sound analysis of protocols using bilinear pairings. In: WITS 2007, pp. 6-21 (2007)
  • 22
    • 24144482305 scopus 로고    scopus 로고
    • Micciancio, D., Panjwani, S.: Adaptive security of symbolic encryption. In: Kilian, J. (ed.) TCC 2005. LNCS, 3378, pp. 169-187. Springer, Heidelberg (2005)
    • Micciancio, D., Panjwani, S.: Adaptive security of symbolic encryption. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 169-187. Springer, Heidelberg (2005)
  • 23
    • 35048899313 scopus 로고    scopus 로고
    • Micciancio, D., Warinschi, B.: Soundness of formal encryption in the presence of active adversaries. In: Naor, M. (ed.) TCC 2004. LNCS, 2951, pp. 133-151. Springer, Heidelberg (2004)
    • Micciancio, D., Warinschi, B.: Soundness of formal encryption in the presence of active adversaries. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 133-151. Springer, Heidelberg (2004)
  • 25
    • 84974554584 scopus 로고
    • Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack
    • Feigenbaum, J, ed, CRYPTO 1991, Springer, Heidelberg
    • Rackoff, C., Simon, D.R.: Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 433-444. Springer, Heidelberg (1992)
    • (1992) LNCS , vol.576 , pp. 433-444
    • Rackoff, C.1    Simon, D.R.2
  • 26
    • 33745142417 scopus 로고    scopus 로고
    • Sequences of games: A tool for taming complexity in security proofs. Cryptology ePrint Archive
    • Report 2004/332
    • Shoup, V.: Sequences of games: a tool for taming complexity in security proofs. Cryptology ePrint Archive, Report 2004/332 (2004), http://eprint.iacr. org/
    • (2004)
    • Shoup, V.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.