搜索结果: 1-9 共查到“protocol design”相关记录9条 . 查询时间(0.095 秒)
But Why does it Work? A Rational Protocol Design Treatment of Bitcoin
Blockchain Protocols Rational Protocol Design Bitcoin
2018/2/8
An exciting recent line of work has focused on formally investigating the core cryptographic assumptions underlying the security of Bitcoin. In a nutshell, these works conclude that Bitcoin is secure ...
UC Commitments for Modular Protocol Design and Applications to Revocation and Attribute Tokens
universal composability commitments attribute tokens
2016/6/7
Complex cryptographic protocols are often designed from simple cryptographic primitives, such as signature schemes, encryption schemes, verifiable random functions, and zero-knowledge proofs, by bridg...
Protocol Design for Large-Scale Cross-Sectional Studies of Sexual Abuse and Associated Factors in Individual Sports: Feasibility Study in Swedish Athletics
Sports epidemiology sexual abuse survey methods gender issues research ethics
2015/5/26
To ensure health and well-being for their athletes, sports organizations must offer preventive measures against sexual abuse. The aim of this study was to design and evaluate feasibility of a research...
Key Exchange with Unilateral Authentication: Composable Security Definition and Modular Protocol Design
key exchange constructive cryptography
2014/3/10
Key exchange with unilateral authentication (short: unilateral key exchange) is an important primitive in practical security protocols; a prime example is the widely deployed TLS protocol, which is us...
Rational Protocol Design: Cryptography Against Incentive-driven Adversaries
Cryptographic Protocols Game Theory Secure Computation Composition
2014/3/10
Existing work on “rational cryptographic protocols” treats each party (or coalition of parties) running the protocol as a selfish agent trying to maximize its utility. In this work we propose a fundam...
Accountability of Centralized Payment Systems: Formal Reasoning, Protocol Design and Analysis
Accountability Electronic payment Formal method Key generation and distribution Payment protocols
2011/9/26
Accountability is one of the most critical security properties of electronic payment protocols. It can be used to resolve disputes among involved parties. Several formal logics were proposed for reaso...
Accountability of Centralized Payment Systems: Formal Reasoning, Protocol Design and Analysis
Accountability Electronic payment Formal method Key generation and distribution Payment protocols
2011/9/26
Accountability is one of the most critical security properties of electronic payment protocols. It can be used to resolve disputes among involved parties. Several formal logics were proposed for reaso...
Vulnerable Household Women’s Health Assessment (VH-WHAT): Protocol Design and Implementation
Gender-based Household women Health protocol Iran
2015/9/21
Background: The gender-based approach can identify women’s health problems on the basis of biological differences and their social, familial and individual roles. Unequal power relationship between me...
Signing on Elements in Bilinear Groups for Modular Protocol Design
Digital Signatures Modular Protocol Design Groth-Sahai Proofs Blind Signatures Group Signatures
2010/3/16
This paper addresses the construction of signature schemes whose verification keys, messages,
and signatures are group elements and the verification predicate is a conjunction of
pairing product equ...