AbstractWhen attacking a distributed protocol, an adaptive adversary is able to determine its actions (e.g., which parties to corrupt) at any time based on its entire view of the protocol including the entire communication history. Proving security of cryptographic protocols against adaptive adversaries is a fundamental problem in cryptography. In this paper, we consider distributed public-key systems which are secure against an adaptive adversary. Specifically, we construct distributed discrete-log-based and RSA-based public-key systems secure against an adaptive adversary. We also extend the discrete-log-based systems to have proactive security, that is, security against an (adaptive) mobile adversary that has an upper bound on the number...
This paper presents three methods for strengthening public key cryptosystems in such a way that they...
In this work we study distributed public key schemes secure against continual memory leakage. The se...
Cryptographic protocols with adaptive security ensure that security holds against an adver-sary who ...
AbstractWhen attacking a distributed protocol, an adaptive adversary is able to determine its action...
Distributed key generation is a main component of threshold cryptosystems and distributed cryptograp...
Abstract. Adaptively-secure encryption schemes ensure secrecy even in the presence of an adversary w...
A fundamental problem in designing secure multi-party protocols is how to deal with adaptive ad-vers...
Adaptively-secure encryption schemes ensure secrecy even in the presence of an adversary who can cor...
Abstract. We propose the first distributed discrete-log key generation (DLKG) protocol from scratch ...
Adaptive security is a strong security notion that captures additional security threats that are not...
Abstract. We revisit the context of leakage-tolerant interactive protocols as defined by Bitanski, C...
International audienceThreshold cryptography is a fundamental distributed computational paradigm for...
Abstract. Threshold cryptography is a fundamental distributed computational paradigm for enhancing t...
Abstract. Threshold cryptography is a fundamental distributed computational paradigm for enhanc-ing ...
This paper presents three methods for strengthening public key cryptosystems in suchaway that they b...
This paper presents three methods for strengthening public key cryptosystems in such a way that they...
In this work we study distributed public key schemes secure against continual memory leakage. The se...
Cryptographic protocols with adaptive security ensure that security holds against an adver-sary who ...
AbstractWhen attacking a distributed protocol, an adaptive adversary is able to determine its action...
Distributed key generation is a main component of threshold cryptosystems and distributed cryptograp...
Abstract. Adaptively-secure encryption schemes ensure secrecy even in the presence of an adversary w...
A fundamental problem in designing secure multi-party protocols is how to deal with adaptive ad-vers...
Adaptively-secure encryption schemes ensure secrecy even in the presence of an adversary who can cor...
Abstract. We propose the first distributed discrete-log key generation (DLKG) protocol from scratch ...
Adaptive security is a strong security notion that captures additional security threats that are not...
Abstract. We revisit the context of leakage-tolerant interactive protocols as defined by Bitanski, C...
International audienceThreshold cryptography is a fundamental distributed computational paradigm for...
Abstract. Threshold cryptography is a fundamental distributed computational paradigm for enhancing t...
Abstract. Threshold cryptography is a fundamental distributed computational paradigm for enhanc-ing ...
This paper presents three methods for strengthening public key cryptosystems in suchaway that they b...
This paper presents three methods for strengthening public key cryptosystems in such a way that they...
In this work we study distributed public key schemes secure against continual memory leakage. The se...
Cryptographic protocols with adaptive security ensure that security holds against an adver-sary who ...