首页 | 本学科首页   官方微博 | 高级检索  
     


Adaptive versus Non-Adaptive Security of Multi-Party Protocols
Authors:Ran Canetti   Ivan Damgard   Stefan Dziembowski   Yuval Ishai  Tal Malkin
Affiliation:(1) IBM Research, 19 Skyline Drive, Hawthorne, NY 10532, USA;(2) BRICS, Aarhus University, Aabogade 34, DK-8000 Aarhus C, Denmark;(3) Institute of Informatics, University of Warsaw, Banacha 2, PL-02-D97 Warsaw, Poland;(4) Department of Computer Science, Technion, Haifa 32000, Israel;(5) Computer Science Department, Columbia University, New York, NY 6027-7003, USA
Abstract:Security analysis of multi-party cryptographic protocols distinguishes betweentwo types of adversarial settings: In the non-adaptive setting the set of corruptedparties is chosen in advance, before the interaction begins. In the adaptive setting theadversary chooses who to corrupt during the course of the computation. We studythe relations between adaptive security (i.e., security in the adaptive setting) and nonadaptivesecurity, according to two definitions and in several models of computation.
Keywords:Multi-party protocols  Definitions of security  Adaptive security
本文献已被 SpringerLink 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号