Modeling Computational Security in Long-Lived Systems, Version 2

For many cryptographic protocols, security relies on the assumption that adversarial entities have limited computational power. This type of security degrades progressively over the lifetime of a protocol. However, some cryptographic services, such as timestamping services or digital archives, are l...

Full description

Bibliographic Details
Main Authors: Lynch, Nancy, Pereira, Olivier, Kaynar, Dilsun, Cheung, Ling, Canetti, Ran
Other Authors: Nancy Lynch
Published: 2008
Online Access:http://hdl.handle.net/1721.1/43711