Abstract. We present the first universally composable key-management func-tionality, formalized in the GNUC framework by Hofheinz and Shoup. It allows the enforcement of a wide range of security policies and can be extended by di-verse key usage operations with no need to repeat the security proof. We illustrate its use by proving an implementation of a security token secure with respect to arbitrary key-usage operations and explore a proof technique that allows the stor-age of cryptographic keys externally, a novel development in simulation-based security frameworks.
Abstract. We propose the first distributed discrete-log key generation (DLKG) protocol from scratch ...
We present the design of a new symmetric key management API for cryptographic devices intended to im...
Ever since the foundational work of Goldwasser and Micali, simulation has proven to be a powerful an...
International audienceWe present the first universally composable key-management functionality, form...
International audienceWe present the first universally composable key-management functionality, form...
International audienceWe present the first universally composable key-management functionality, form...
This is the full version of the paper.We present the first key-management functionality in the Unive...
This is the full version of the paper.We present the first key-management functionality in the Unive...
We present the first universally composable key-management functionality, formalized in the GNUC fra...
We propose and realize a definition of security for password-based key exchange within the framework...
Abstract We propose and realize a definition of security for password-based key exchange within thef...
In this paper we examine composability properties for the fundamental task of key exchange. Roughly ...
Abstract. Many real-world protocols, such as SSL/TLS, SSH, IPsec, DNSSEC, IEEE 802.11i, and Kerberos...
Cryptography is a cornerstone for the protection of the digital society, and security definitions li...
We treat the security of group key exchange (GKE) in the universal composability (UC) framework. Ana...
Abstract. We propose the first distributed discrete-log key generation (DLKG) protocol from scratch ...
We present the design of a new symmetric key management API for cryptographic devices intended to im...
Ever since the foundational work of Goldwasser and Micali, simulation has proven to be a powerful an...
International audienceWe present the first universally composable key-management functionality, form...
International audienceWe present the first universally composable key-management functionality, form...
International audienceWe present the first universally composable key-management functionality, form...
This is the full version of the paper.We present the first key-management functionality in the Unive...
This is the full version of the paper.We present the first key-management functionality in the Unive...
We present the first universally composable key-management functionality, formalized in the GNUC fra...
We propose and realize a definition of security for password-based key exchange within the framework...
Abstract We propose and realize a definition of security for password-based key exchange within thef...
In this paper we examine composability properties for the fundamental task of key exchange. Roughly ...
Abstract. Many real-world protocols, such as SSL/TLS, SSH, IPsec, DNSSEC, IEEE 802.11i, and Kerberos...
Cryptography is a cornerstone for the protection of the digital society, and security definitions li...
We treat the security of group key exchange (GKE) in the universal composability (UC) framework. Ana...
Abstract. We propose the first distributed discrete-log key generation (DLKG) protocol from scratch ...
We present the design of a new symmetric key management API for cryptographic devices intended to im...
Ever since the foundational work of Goldwasser and Micali, simulation has proven to be a powerful an...