Modeling Computational Security in Long-Lived Systems, Version 2
For many cryptographic protocols, security relies on the assumption that adversarial entities have limited computational power. This type of security degrades progressively over the lifetime of a protocol. However, some cryptographic services, such as timestamping services or digital archives, are l...
Main Authors: | Lynch, Nancy, Pereira, Olivier, Kaynar, Dilsun, Cheung, Ling, Canetti, Ran |
---|---|
Other Authors: | Nancy Lynch |
Published: |
2008
|
Online Access: | http://hdl.handle.net/1721.1/43711 |
Similar Items
-
Using Task-Structured Probabilistic I/O Automata to Analyze an Oblivious Transfer Protocol
by: Canetti, Ran, et al.
Published: (2007) -
Task-Structured Probabilistic I/O Automata
by: Canetti,, Ran, et al.
Published: (2006) -
Using Task-Structured Probabilistic I/O Automata to Analyze an Oblivious Transfer Protocol
by: Canetti, Ran, et al.
Published: (2006) -
Task-structured probabilistic I/O automata
by: Canetti, Ran, et al.
Published: (2021) -
Task-Structured Probabilistic I/O Automata
by: Canetti, Ran, et al.
Published: (2006)