What people are saying - Write a review
We haven't found any reviews in the usual places.
A Calculus for Access Control in Distributed Systems invited
Deriving the Complete Knowledge of Participants in Cryptographic Protocols
Systematic Design of TwoParty Authentication Protocols
26 other sections not shown
Other editions - View all
addition adversary algorithm Alice Alice and Bob assume assumption authentication codes binary bits boolean byte cheating choose chosen ciphertext attack circuit closure co-NP Computer Science construct Crypto cryptographic decryption defined definition delegation denote digital signature discrete logarithm distribution divisor efficient elements elliptic curves encoding rules encryption equation example exists given Goldwasser hash functions hyperelliptic hyperelliptic curve IEEE input integer interactive proof system jacobian knowledge Lemma Micali modulo multiplicative n-bit node non-interactive oblivious transfer obtain one-way functions oracle output permutation plaintext attack polynomial possible prime probabilistic probability problem Proc Proceedings processors prove public cryptosystems public key random result round satisfies secret key exchange secret sharing scheme Section secure protocol sends Shamir signature scheme Step strategy string Theorem trapdoor functions untraceable variables vector Verifiable Secret Sharing zero zero-knowledge proof