首页> 外文会议>Computer Security Foundations Workshop >Complexity theoretic analysis of crypto-protocols-overview
【24h】

Complexity theoretic analysis of crypto-protocols-overview

机译:Crypto-Cotals-概述的复杂性理论分析

获取原文
获取外文期刊封面目录资料

摘要

Most of the complexity theoretic research on crypto-protocols has concentrated in two main directions. Developing general protocols to compute any multiparty function, and developing efficient protocols for specific functions. The general approach sharpened understanding of what is the exact meaning of 'secure' protocol, and resulted a rich new area of complexity theory, but in most cases resulted solutions which are currently too complex for any real usage. The second approach, which may be termed, the 'applied' approach benefited from the insight and the beauty of those new theories, but in most cases had to go its own way, not only in dealing with specific functions, but also in many cases in dealing with specific restricted adversaries (rather than 'any random polynomial time adversary'). The author illustrates some examples from these areas.
机译:密码协议的大多数复杂性理论研究集中在两个主要方向上。开发一般协议以计算任何多级函数,以及为特定功能开发有效的协议。一般方法锐化了对“安全”协议的确切含义的理解,并导致了丰富的复杂性理论的新领域,但在大多数情况下,导致解决方案对于任何真正的使用而言过于复杂。可能被称为的第二种方法,“应用”的方法受益于这些新理论的洞察力和美丽,但在大多数情况下不得不自行,不仅在处理特定的功能,而且在许多情况下也是如此在处理特定的受限制的对手(而不是“任何随机多项式敌对”)。作者说明了这些区域的一些示例。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号