Results 1 to 10 of about 1,813,060 (277)
Quantum cryptographic three party protocols [PDF]
Due to the impossibility results of Mayers and Lo/Chau it is generally thought that a quantum channel is cryptographically strictly weaker than oblivious transfer. In this paper we prove that in a three party scenario a quantum channel can be strictly stronger than oblivious transfer.
Joern Mueller-Quade, Hiroyuki Imai
arxiv +3 more sources
Universally composable security: a new paradigm for cryptographic protocols [PDF]
We propose a novel paradigm for defining security of cryptographic protocols, called universally composable security. The salient property of universally composable definitions of security is that they guarantee security even when a secure protocol is ...
Ran Canetti
openalex +2 more sources
Is it possible to decide whether a cryptographic protocol is secure or not?
We consider the so called ``cryptographic protocols`` whose aim is to ensure some security properties when communication channels are not reliable. Such protocols usually rely on cryptographic primitives.
Hubert Comon, Vitaly Shmatikov
doaj +2 more sources
A Rational Approach to Cryptographic Protocols [PDF]
This work initiates an analysis of several cryptographic protocols from a rational point of view using a game-theoretical approach, which allows us to represent not only the protocols but also possible misbehaviours of parties. Concretely, several concepts of two-person games and of two-party cryptographic protocols are here combined in order to model ...
Pino Caballero‐Gil+2 more
arxiv +2 more sources
Cryptographic Authentication of Navigation Protocols [PDF]
We examine the security of existing radio navigation protocols and attempt to define secure, scalable replacements.
Sam Bretheim
arxiv +3 more sources
Towards an information-theoretically safe cryptographic protocol [PDF]
We introduce what --if some kind of group action exists-- is a truly (information theoretically) safe cryptographic communication system: a protocol which provides \emph{zero} information to any passive adversary having full access to the channel.
Pedro Fortuny Ayuso
arxiv +3 more sources
Optimizing cryptographic protocols against side channel attacks using WGAN-GP and genetic algorithms [PDF]
This research introduces a novel hybrid cryptographic framework that combines traditional cryptographic protocols with advanced methodologies, specifically Wasserstein Generative Adversarial Networks with Gradient Penalty (WGAN-GP) and Genetic Algorithms
Purushottam Singh+2 more
doaj +2 more sources
Constructing formal models of cryptographic protocols from Alice&Bob style specifications via LLM [PDF]
Automated formal analysis is a fundamental method for ensuring the security of cryptographic protocol design. This approach entails two stages: formal modeling and formal analysis.
Qiang Li+4 more
doaj +2 more sources
The Inductive Approach to Verifying Cryptographic Protocols [PDF]
Informal arguments that cryptographic protocols are secure can be made rigorous using inductive definitions. The approach is based on ordinary predicate calculus and copes with infinite-state systems. Proofs are generated using Isabelle/HOL.
Lawrence Charles Paulson
semanticscholar +1 more source
A transport-independent general purpose cryptographic protocol
The article considers the problem of the transport-independent cryptographic protocol. We analyze requirements for general purpose cryptographic protocol. An analysis of existing protocols is performed to highlight their drawbacks. A protocol schema and
К. Лесогорський+1 more
doaj +1 more source