Secure Computation Without Authentication
- 15 September 2010
- journal article
- research article
- Published by Springer Science and Business Media LLC in Journal of Cryptology
- Vol. 24 (4), 720-760
- https://doi.org/10.1007/s00145-010-9075-9
Abstract
No abstract availableKeywords
This publication has 20 references indexed in Scilit:
- Credential Authenticated Identification and Key ExchangeLecture Notes in Computer Science, 2010
- Universally Composable Password-Based Key ExchangeLecture Notes in Computer Science, 2005
- Universal Composition with Joint StateLecture Notes in Computer Science, 2003
- Session-Key Generation Using Human Passwords OnlyLecture Notes in Computer Science, 2001
- Universally Composable CommitmentsLecture Notes in Computer Science, 2001
- Security and Composition of Multiparty Cryptographic ProtocolsJournal of Cryptology, 2000
- Nonmalleable CryptographySIAM Journal on Computing, 2000
- Public-key cryptography and password protocolsACM Transactions on Information and System Security, 1999
- The Knowledge Complexity of Interactive Proof SystemsSIAM Journal on Computing, 1989
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message AttacksSIAM Journal on Computing, 1988