搜索结果: 1-3 共查到“军事学 adaptive corruption”相关记录3条 . 查询时间(0.39 秒)
Towards Strong Adaptive Corruption Security of Authenticated Key Exchange
Security model Authenticated Key Exchange SessionState Ephemeral Key Key Compromise Impersonation Unknown Key Share Matching Sessions
2011/2/23
In this paper we study strong adaptive corruption security definitions for authenticated key exchange (AKE) protocols. Many recent protocols for Authenticated Key Exchange have been proven correct in ...
CCA-Secure Unidirectional Proxy Re-Encryption in the Adaptive Corruption Model without Random Oracles
Department of Computer Science, Jinan University School of Information Systems, Singapore Management University
2010/7/13
Proxy re-encryption (PRE), introduced by Blaze, Bleumer and Strauss in Eurocrypt'98, allows a semi-trusted proxy to convert a ciphertext originally intended for Alice into an encryption of the same me...
From Dolev-Yao to Strong Adaptive Corruption:Analyzing Security in the Presence of Compromising Adversaries
Dolev-Yao Strong Adaptive Corruption hierarchy of adversary models
2009/6/11
We formalize a hierarchy of adversary models for security
protocol analysis, ranging from a Dolev-Yao style adversary
to more powerful adversaries who can reveal different parts
of principals’ stat...