Zobrazeno 1 - 10
of 20
pro vyhledávání: '"Christian Badertscher"'
Publikováno v:
Computer Security – ESORICS 2022 ISBN: 9783031171420
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::0c015d075e01893a96368a05dc80c399
https://doi.org/10.1007/978-3-031-17143-7_2
https://doi.org/10.1007/978-3-031-17143-7_2
Publikováno v:
Badertscher, C, Kiayias, A, Kohlweiss, M & Waldner, H 2021, Consistency for Functional Encryption . in 2021 IEEE 34th Computer Security Foundations Symposium (CSF) . pp. 1-16, 34th IEEE Computer Security Foundations Symposium, 21/06/21 . https://doi.org/10.1109/CSF51468.2021.00045
CSF
CSF
In functional encryption (FE) a sender, Alice, encrypts plaintexts for which a receiver, Bob, can obtain functional evaluations, while Charlie is responsible for initializing the encryption keys and issuing the decryption keys. Standard notions of se
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::283d8a1869b09d9395edeab9c4c81289
https://hdl.handle.net/20.500.11820/512b2fa9-4cd7-41da-b23e-046d0f6838fe
https://hdl.handle.net/20.500.11820/512b2fa9-4cd7-41da-b23e-046d0f6838fe
Publikováno v:
Theory of Cryptography ISBN: 9783030904524
TCC (2)
TCC (2)
In universally composable (UC) security, a global setup is intended to capture the ideal behavior of a primitive which is accessible by multiple protocols, allowing them to share state. A representative example is the Bitcoin ledger. Indeed, since Bi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ee1da4d12e3fc880b57058f4070d7a39
https://doi.org/10.1007/978-3-030-90453-1_22
https://doi.org/10.1007/978-3-030-90453-1_22
Publikováno v:
Theory of Cryptography ISBN: 9783030904586
TCC (1)
TCC (1)
Proofs of knowledge (PoK) are one of the most fundamental notions in cryptography. The appeal of this notion is that it provides a general template that an application can suitably instantiate by choosing a specific relation. Nonetheless, several imp
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::7e2e031c8bcf28b60486c20b2dfdbd01
https://doi.org/10.1007/978-3-030-90459-3_17
https://doi.org/10.1007/978-3-030-90459-3_17
Publikováno v:
Advances in Cryptology – CRYPTO 2021 ISBN: 9783030842512
CRYPTO (3)
CRYPTO (3)
Game-theoretic analyses of cryptocurrencies and—more generally—blockchain-based decentralized ledgers offer insight on their economic robustness and behavior when even their underpinning cryptographic assumptions fail. In this work we utilize the
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b063e5c57b8121943056dac268b99b70
https://doi.org/10.1007/978-3-030-84252-9_1
https://doi.org/10.1007/978-3-030-84252-9_1
Publikováno v:
Theory of Cryptography ISBN: 9783030904555
TCC (3)
TCC (3)
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::53e88c33e6fbd61652203ade21dbc898
https://doi.org/10.1007/978-3-030-90456-2_12
https://doi.org/10.1007/978-3-030-90456-2_12
Publikováno v:
Public-Key Cryptography – PKC 2021 ISBN: 9783030752477
Public Key Cryptography (2)
Public Key Cryptography (2)
This paper takes a fresh approach to systematically characterizing, comparing, and understanding CCA-type security definitions for public-key encryption (PKE), a topic with a long history. The justification for a concrete security definition X is rel
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5d9e6e705fc8e5cf521a71e71c5ff785
https://doi.org/10.1007/978-3-030-75248-4_7
https://doi.org/10.1007/978-3-030-75248-4_7
Autor:
Christian Badertscher, Elham Kashefi, Dominik Leichtle, Petros Wallden, Léo Colisson, Atul Mantri, Alexandru Cojocaru
Publikováno v:
Badertscher, C, Cojocaru, A, Colisson, L, Kashefi, E, Leichtle, D, Mantri, A & Wallden, P 2020, Security Limitations of Classical-Client Delegated Quantum Computing . in Advances in Cryptology – ASIACRYPT 2020 . vol. 2, Lecture Notes in Computer Science, vol. 12492, pp. 667-696, 26th Annual International Conference on the Theory and Application of Cryptology and Information Security, Online, 7/12/20 . https://doi.org/10.1007/978-3-030-64834-3_23
Advances in Cryptology – ASIACRYPT 2020-26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings, Part II
Asiacrypt 2020
Asiacrypt 2020, Dec 2020, Virtual Event, South Korea
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Advances in Cryptology – ASIACRYPT 2020
Advances in Cryptology – ASIACRYPT 2020 ISBN: 9783030648336
ASIACRYPT (2)
Advances in Cryptology – ASIACRYPT 2020-26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings, Part II
Asiacrypt 2020
Asiacrypt 2020, Dec 2020, Virtual Event, South Korea
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Advances in Cryptology – ASIACRYPT 2020
Advances in Cryptology – ASIACRYPT 2020 ISBN: 9783030648336
ASIACRYPT (2)
Secure delegated quantum computing allows a computationally weak client to outsource an arbitrary quantum computation to an untrusted quantum server in a privacy-preserving manner. One of the promising candidates to achieve classical delegation of qu
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::44b0d9c418e1625d896f972a90126e30
http://arxiv.org/abs/2007.01668
http://arxiv.org/abs/2007.01668
Publikováno v:
Theory of Cryptography ISBN: 9783030643805
TCC (3)
TCC (3)
The Global and Externalized UC frameworks [Canetti-Dodis-Pass-Walfish, TCC 07] extend the plain UC framework to additionally handle protocols that use a “global setup”, namely a mechanism that is also used by entities outside the protocol. These
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e27c4600c398e50d1aeff8afb2b9138a
https://doi.org/10.1007/978-3-030-64381-2_1
https://doi.org/10.1007/978-3-030-64381-2_1
Autor:
Ueli Maurer, Christian Badertscher
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783319769523
CT-RSA
CT-RSA
The security of data outsourcing mechanisms has become a crucial aspect of today’s IT infrastructures and they are the cryptographic foundations of real-world applications. The very fundamental goals are ensuring storage integrity and auditability,
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::2abab5b0e6b95ad25c2667ca483bffe5
https://doi.org/10.1007/978-3-319-76953-0_19
https://doi.org/10.1007/978-3-319-76953-0_19