搜索结果: 1-3 共查到“军事学 two-party protocols”相关记录3条 . 查询时间(0.08 秒)
Asharov, Canetti, and Hazay (Eurocrypt 2011) studied how game-theoretic concepts can be used to capture the cryptographic properties of correctness, privacy, and fairness in two-party protocols for fa...
A Compiler of Two-Party Protocols for Composable and Game-Theoretic Security, and Its Application to Oblivious Transfer
game-theoretic security universal composability local universal composability
2015/12/22
In this paper, we consider the following question: Does composing protocols having gametheoretic
security result in a secure protocol in the sense of game-theoretic security? In order
to discuss the...
Universally Composable Symbolic Analysis for Two-Party Protocols based on Homomorphic Encryption
Cryptographic protocols Security analysis
2014/3/12
We consider a class of two-party function evaluation protocols in which the parties are allowed to use ideal functionalities as well as a set of powerful primitives, namely commitments, homomorphic en...