Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
Blog
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
My ScienceOpen
Sign in
Register
Dashboard
Search
37
views
18
references
Top references
cited by
28
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
3,969
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Theory of Cryptography
Universally Composable Security with Global Setup
other
Author(s):
Ran Canetti
,
Yevgeniy Dodis
,
Rafael Pass
,
Shabsi Walfish
Publication date
(Print):
2007
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Security and Safety (S&S)
Most cited references
18
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Universally composable security: a new paradigm for cryptographic protocols
R. Canetti
(2025)
0
comments
Cited
235
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Security and Composition of Multiparty Cryptographic Protocols
Ran Canetti
(2000)
0
comments
Cited
155
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Universally Composable Commitments
Ran Canetti
,
Marc Fischlin
(2001)
0
comments
Cited
76
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Pages
: 61-85
DOI:
10.1007/978-3-540-70936-7_4
SO-VID:
8b5e0f43-9a41-48f8-9d27-5cb5ad16f1b5
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Does Privacy Require True Randomness?
pp. 61
Universally Composable Security with Global Setup
pp. 118
Perfect NIZK with Adaptive Soundness
pp. 137
Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries
pp. 194
On Best-Possible Obfuscation
pp. 233
Securely Obfuscating Re-encryption
pp. 434
Towards a Separation of Semantic and CCA Security for Public Key Encryption
pp. 456
Unifying Classical and Quantum Key Distillation
pp. 479
Intrusion-Resilient Key Exchange in the Bounded Retrieval Model
pp. 515
Multi-authority Attribute Based Encryption
pp. 535
Conjunctive, Subset, and Range Queries on Encrypted Data
pp. 575
Evaluating Branching Programs on Encrypted Data
Similar content
3,969
Wave-induced setup and wave-driven current over Quasi-2DH reef-lagoon-channel systems
Authors:
Zhenhua Huang
,
Stephen Monismith
,
Wenrun He
…
Effect of Surgical Mask on Setup Error in Head and Neck Radiotherapy
Authors:
Yi Ding
,
Pingping Ma
,
Wei Li
…
Hyperspectral Image Analysis in Environmental Monitoring: Setup of a New Tunable Filter Platform
Authors:
Monica Moroni
,
Emanuela Lupo
,
Emanuela Marra
…
See all similar
Cited by
28
Universally Composable Multi-party Computation Using Tamper-Proof Hardware
Authors:
Jonathan Katz
Classical Cryptographic Protocols in a Quantum World
Authors:
Sean Hallgren
,
Adam Smith
,
Fang Song
David and Goliath Commitments: UC Computation for Asymmetric Parties Using Tamper-Proof Hardware
Authors:
Tal Moran
,
Gil Segev
See all cited by