Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
random oracle model
biblio
Mechanizing the Proof of Adaptive, Information-Theoretic Security of Cryptographic Protocols in the Random Oracle Model
Submitted by grigby1 on Wed, 01/10/2018 - 12:20pm
pubcrawl
information-theoretic security
Metrics
multiparty cryptographic protocols
nonprogrammable random choices
oracle knowledge
party private count retrieval protocol
Policy
Protocols
information theoretic security
random oracle model
real-ideal paradigm
Resiliency
Scalability
security of data
Servers
Upper bound
adaptive adversaries
human factor
Human behavior
honest-but-curious security
games approach sequence
Games
game theory
game parameters
EASYCRYPT proof assistant
Databases
Cryptography
Cryptographic Protocols
concrete upper bounds
composability
Complexity theory
collaboration
biblio
Anonymous Identity-Based Broadcast Encryption with Constant Decryption Complexity and Strong Security
Submitted by grigby1 on Fri, 10/27/2017 - 12:19pm
Compositionality
Metrics
pubcrawl
Resiliency
Human behavior
adaptive attack
anonymous identity-based broadcast encryption
constant decryption complexity
random oracle model
standard model
Asymmetric Encryption
biblio
Anonymous Identity-Based Broadcast Encryption with Constant Decryption Complexity and Strong Security
Submitted by grigby1 on Mon, 07/24/2017 - 2:02pm
adaptive attack
anonymous identity-based broadcast encryption
Compositionality
constant decryption complexity
Metrics
provable security
pubcrawl
random oracle model
Resiliency
standard model
biblio
Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security
Submitted by grigby1 on Tue, 06/27/2017 - 1:04pm
adaptive chosen-ciphertext security
anonymous
Human behavior
Identity management
identity-based broadcast encryption
Metrics
pubcrawl
random oracle model
Resiliency
Scalability
weakly robust
« first
‹ previous
1
2