Главная
Study mode:
on
1
Intro
2
Alice and Bob and Carol and
3
When Alice talks to a corrupte
4
When Alice talks to an honest
5
The commitment problem: the
6
We hash the first message
7
If the adversary is allowed
8
previous construction is imprac
Description:
Explore a presentation from Crypto 2018 on practical and tightly secure digital signatures and authenticated key exchange. Delve into the paper by Kristian Gjøsteen and Tibor Jager, which addresses key issues in cryptographic protocols. Learn about the commitment problem and its implications for secure communication. Examine scenarios involving Alice, Bob, and Carol, including interactions with corrupted and honest parties. Discover how hashing the first message can enhance security. Analyze the limitations of previous constructions and the challenges faced when adversaries are granted certain permissions. Gain insights into the complexities of designing robust cryptographic systems for real-world applications.

Practical and Tightly Secure Digital Signatures and Authenticated Key Exchange

TheIACR
Add to list
0:00 / 0:00