Author:
Backes Michael,Hofheinz Dennis
Publisher
Springer Berlin Heidelberg
Reference13 articles.
1. Backes, M., Hofheinz, D.: How to break and repair a universally composable signature functionality. Technical Report RZ 3512, IBM Research Division (November 2003), Online available at http://www.research.ibm.com/resources/paper_search.shtml
2. Canetti, R.: Universally composable security: A new paradigm for cryptographic protocols. In: Proc. 42nd IEEE Symposium on Foundations of Computer Science (FOCS), pp. 136–145. IEEE Computer Society, Los Alamitos (2001), http://eprint.iacr.org/2000/067
3. Canetti, R.: On universally composable notions of security for signature, certification and authentication. Cryptology ePrint archive (November 2003)
4. Lecture Notes in Computer Science;R. Canetti,2002
5. Canetti, R., Lindell, Y., Ostrovsky, R., Sahai, A.: Universally composable two-party and multi-party secure computation. In: Proc. 34th Annual ACM Symposium on Theory of Computing (STOC), pp. 494–503 (2002), http://eprint.iacr.org/2002/140
Cited by
21 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Universally Composable Linkable Ring Signature Supporting Stealth Addresses;Mathematics;2024-02-03
2. Universally Composable Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key;Lecture Notes in Computer Science;2024
3. Universally Composable Auditable Surveillance;Advances in Cryptology – ASIACRYPT 2023;2023
4. GearBox;Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security;2022-11-07
5. Sleepy Channels;Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security;2022-11-07