Automated Proofs for Asymmetric Encryption

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Automated Proofs for Asymmetric Encryption: First results in the random oracle model

Chosen-ciphertext security is by now a standard security property for asymmetric encryption. Many generic constructions for building secure cryptosystems from primitives with lower level of security have been proposed. Providing security proofs has also become standard practice. There is, however, a lack of automated verification procedures that analyse such cryptosystems and provide security p...

متن کامل

Flexible Interface for Automated Proofs

The aartifact system [1] is an automated assistant for formal reasoning. It is currently architected using a client-server model. In order to better support in-class use, and enable greater scalability a JavaScript implementation of key functional areas of the sytem is desired. The automated proof landscape has to date concentrated little effort towards creating suitably usable interfaces. Towa...

متن کامل

Lecture 10 Asymmetric Encryption

Recall that in the last lecture we discussed cryptographic security in the symmetric setting. The typical arrangement is that Alice and Bob share a common key that they use for encryption and decryption. This shared secret creates an distinction between the communicating parties (Alice and Bob) and the adversarial eavesdropper (Eve). The goal in this setting is to ensure that without the shared...

متن کامل

Distributed Searchable Asymmetric Encryption

Searchable asymmetric encryption (SAE) can also be called Public Key Encryption with Keyword Search (PEKS), which allows us to search the keyword on the data of having been encrypted. The essence of Asymmetric searchable encryption is that users exchange the data of encryption, one party sends a ciphertext with key encryption, and the other party with another key receives the ciphertext. Encryp...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Automated Reasoning

سال: 2010

ISSN: 0168-7433,1573-0670

DOI: 10.1007/s10817-010-9186-x