Results 1 - 10
of
3,195
Long-term security and universal composability
- JOURNAL OF CRYPTOLOGY
, 2010
"... Algorithmic progress and future technological advances threaten today’s cryptographic protocols. This may allow adversaries to break a protocol retrospectively by breaking the underlying complexity assumptions long after the execution of the protocol. Longterm secure protocols, protocols that after ..."
Abstract
-
Cited by 10 (2 self)
- Add to MetaCart
composability (UC) captures this requirement. This is the first paper to study protocols which are simultaneously long-term secure and universally composable. We show that the usual set-up assumptions used for UC protocols (e.g., a common reference string) are not sufficient to achieve long-term secure
A DIGITAL SIGNATURE SCHEME FOR LONG-TERM SECURITY
"... Abstract. In this paper we propose a signature scheme based on two intractable problems, namely the integer factorization problem and the discrete logarithm problem for elliptic curves. It is suitable for applications requiring long-term security and provides a more e cient solution than the existin ..."
Abstract
- Add to MetaCart
Abstract. In this paper we propose a signature scheme based on two intractable problems, namely the integer factorization problem and the discrete logarithm problem for elliptic curves. It is suitable for applications requiring long-term security and provides a more e cient solution than
Perspectives for Cryptographic Long-Term Security
- Communications of the ACM
, 2006
"... any activities, including communication, commerce, medical care, public administration, politics, and education depend heav-ily on information technology. IT systems of the future will be highly dynamic. Mobile networks will consist of billions of het-erogeneously computing devices: sensors, RFIDs, ..."
Abstract
-
Cited by 9 (1 self)
- Add to MetaCart
foundation for most IT security solu-tions. Three illustrative examples include: • Digital signatures are used to prove the authenticity of auto-matic software updates, for example for operating systems such as Microsoft Windows XP. The update is digitally signed by the issuer. Only if the digital signature
Secure Computability of Functions in the IT setting with Dishonest Majority and Applications to Long-Term Security
, 2008
"... It is well known that general secure function evaluation (SFE) with information-theoretical (IT) security is infeasible in presence of a corrupted majority in the standard model. On the other hand, there are SFE protocols (Goldreich et al. [STOC’87]) that are computationally secure (without fairness ..."
Abstract
-
Cited by 7 (2 self)
- Add to MetaCart
by an attacker whose power increases over time (e.g. due to new technical developments). Therefore, we ask which functions can be computed with long-term security, where we admit computational assumptions for the duration of a computation, but require IT security (privacy) once the computation is concluded
Reconfigurable Cryptography: A flexible approach to long-term security
, 2015
"... We put forward the concept of a reconfigurable cryptosystem. Intuitively, a reconfigurable cryptosystem allows to increase the security of the system at runtime, by changing a single central parameter we call common reference string (CRS). In particular, e.g., a cryptanalytic advance does not necess ..."
Abstract
- Add to MetaCart
. Besides a security definition, we offer two reconfigurable encryption schemes, and one recon-figurable signature scheme. Our first reconfigurable encryption scheme uses indistinguishability obfuscation (however only in the CRS) to adaptively derive short-term keys from long-term keys. The security of long-term
1 Assessing Long-term Security of Electricity Supply and the Role of Renewable Energy: A Probabilistic Generation Portfolio Analysis Approach
"... A modelling tool is applied to assess long-term energy security in the Australian National Electricity Market (NEM). The potential role of renewable energy in increasing the security of electricity supply is examined, with a focus on two aspects: price risk and physical supply risk. Optimised portfo ..."
Abstract
- Add to MetaCart
A modelling tool is applied to assess long-term energy security in the Australian National Electricity Market (NEM). The potential role of renewable energy in increasing the security of electricity supply is examined, with a focus on two aspects: price risk and physical supply risk. Optimised
Investor psychology and security market under- and overreactions
- Journal of Finance
, 1998
"... We propose a theory of securities market under- and overreactions based on two well-known psychological biases: investor overconfidence about the precision of private information; and biased self-attribution, which causes asymmetric shifts in investors ’ confidence as a function of their investment ..."
Abstract
-
Cited by 698 (43 self)
- Add to MetaCart
-run earnings “drift, ” but negative correlation between future returns and long-term past stock market and accounting performance. The theory also offers several untested implications and implications for corporate fi-nancial policy. IN RECENT YEARS A BODY OF evidence on security returns has presented a sharp
Momentum strategies
- Journal of Finance
, 1996
"... We examine whether the predictability of future returns from past returns is due to the market's underreaction to information, in particular to past earnings news. Past return and past earnings surprise each predict large drifts in future returns after controlling for the other. Market risk, si ..."
Abstract
-
Cited by 334 (4 self)
- Add to MetaCart
past performance. The results suggest a market that responds only gradually to new information. AN EXTENSIVE BODY OF RECENT finance literature documents that the crosssection of stock returns is predictable based on past returns. For example, DeBondt and Thaler (1985, 1987)report that long-term past
Long-term Interest Rates under Inflation Targeting:
, 2009
"... One advantage cited for formal inflation targeting is that by anchoring inflationary expectations such a policy framework would aid in the pricing of long-term securities. Long-term interest rates would become less sensitive to temporary shocks to the economy including policy induced changes in shor ..."
Abstract
- Add to MetaCart
One advantage cited for formal inflation targeting is that by anchoring inflationary expectations such a policy framework would aid in the pricing of long-term securities. Long-term interest rates would become less sensitive to temporary shocks to the economy including policy induced changes
Results 1 - 10
of
3,195