Reactively secure signature schemes
- 8 February 2005
- journal article
- Published by Springer Nature in International Journal of Information Security
- Vol. 4 (4) , 242-252
- https://doi.org/10.1007/s10207-004-0062-8
Abstract
No abstract availableKeywords
This publication has 36 references indexed in Scilit:
- Intransitive non-interference for cryptographic purposesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2004
- Low-Level Ideal Signatures and General Integrity IdealizationPublished by Springer Nature ,2004
- A composable cryptographic library with nested operationsPublished by Association for Computing Machinery (ACM) ,2003
- Polynomial fairness and livenessPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Cryptographically Sound and Machine-Assisted Verification of Security ProtocolsPublished by Springer Nature ,2003
- Reactively Secure Signature SchemesPublished by Springer Nature ,2003
- Computational Probabilistic Non-interferencePublished by Springer Nature ,2002
- How to Break a “Secure” Oblivious Transfer ProtocolPublished by Springer Nature ,2001
- Public-Key Encryption in a Multi-user Setting: Security Proofs and ImprovementsPublished by Springer Nature ,2000
- Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minorityJournal of Cryptology, 1991