• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 3,195
Next 10 →

Long-term security and universal composability

by Jörn Müller-quade, Dominique Unruh - JOURNAL OF CRYPTOLOGY , 2010
"... Algorithmic progress and future technological advances threaten today’s cryptographic protocols. This may allow adversaries to break a protocol retrospectively by breaking the underlying complexity assumptions long after the execution of the protocol. Longterm secure protocols, protocols that after ..."
Abstract - Cited by 10 (2 self) - Add to MetaCart
composability (UC) captures this requirement. This is the first paper to study protocols which are simultaneously long-term secure and universally composable. We show that the usual set-up assumptions used for UC protocols (e.g., a common reference string) are not sufficient to achieve long-term secure

A DIGITAL SIGNATURE SCHEME FOR LONG-TERM SECURITY

by Dimitrios Poulakis, Robert Rolland
"... Abstract. In this paper we propose a signature scheme based on two intractable problems, namely the integer factorization problem and the discrete logarithm problem for elliptic curves. It is suitable for applications requiring long-term security and provides a more e cient solution than the existin ..."
Abstract - Add to MetaCart
Abstract. In this paper we propose a signature scheme based on two intractable problems, namely the integer factorization problem and the discrete logarithm problem for elliptic curves. It is suitable for applications requiring long-term security and provides a more e cient solution than

Perspectives for Cryptographic Long-Term Security

by Johannes Buchmann, Alexander May, Ulrich Vollmer - Communications of the ACM , 2006
"... any activities, including communication, commerce, medical care, public administration, politics, and education depend heav-ily on information technology. IT systems of the future will be highly dynamic. Mobile networks will consist of billions of het-erogeneously computing devices: sensors, RFIDs, ..."
Abstract - Cited by 9 (1 self) - Add to MetaCart
foundation for most IT security solu-tions. Three illustrative examples include: • Digital signatures are used to prove the authenticity of auto-matic software updates, for example for operating systems such as Microsoft Windows XP. The update is digitally signed by the issuer. Only if the digital signature

Secure Computability of Functions in the IT setting with Dishonest Majority and Applications to Long-Term Security

by Robin Künzler, Jörn Müller-quade, Dominik Raub , 2008
"... It is well known that general secure function evaluation (SFE) with information-theoretical (IT) security is infeasible in presence of a corrupted majority in the standard model. On the other hand, there are SFE protocols (Goldreich et al. [STOC’87]) that are computationally secure (without fairness ..."
Abstract - Cited by 7 (2 self) - Add to MetaCart
by an attacker whose power increases over time (e.g. due to new technical developments). Therefore, we ask which functions can be computed with long-term security, where we admit computational assumptions for the duration of a computation, but require IT security (privacy) once the computation is concluded

Reconfigurable Cryptography: A flexible approach to long-term security

by Julia Hesse, Dennis Hofheinz , 2015
"... We put forward the concept of a reconfigurable cryptosystem. Intuitively, a reconfigurable cryptosystem allows to increase the security of the system at runtime, by changing a single central parameter we call common reference string (CRS). In particular, e.g., a cryptanalytic advance does not necess ..."
Abstract - Add to MetaCart
. Besides a security definition, we offer two reconfigurable encryption schemes, and one recon-figurable signature scheme. Our first reconfigurable encryption scheme uses indistinguishability obfuscation (however only in the CRS) to adaptively derive short-term keys from long-term keys. The security of long-term

1 Assessing Long-term Security of Electricity Supply and the Role of Renewable Energy: A Probabilistic Generation Portfolio Analysis Approach

by Peerapat Vithayasrichareon, Jenny Riesz, Iain Macgill
"... A modelling tool is applied to assess long-term energy security in the Australian National Electricity Market (NEM). The potential role of renewable energy in increasing the security of electricity supply is examined, with a focus on two aspects: price risk and physical supply risk. Optimised portfo ..."
Abstract - Add to MetaCart
A modelling tool is applied to assess long-term energy security in the Australian National Electricity Market (NEM). The potential role of renewable energy in increasing the security of electricity supply is examined, with a focus on two aspects: price risk and physical supply risk. Optimised

Investor psychology and security market under- and overreactions

by Kent Daniel, David Hirshleifer - Journal of Finance , 1998
"... We propose a theory of securities market under- and overreactions based on two well-known psychological biases: investor overconfidence about the precision of private information; and biased self-attribution, which causes asymmetric shifts in investors ’ confidence as a function of their investment ..."
Abstract - Cited by 698 (43 self) - Add to MetaCart
-run earnings “drift, ” but negative correlation between future returns and long-term past stock market and accounting performance. The theory also offers several untested implications and implications for corporate fi-nancial policy. IN RECENT YEARS A BODY OF evidence on security returns has presented a sharp

Momentum strategies

by Louis K. C. Chan, Narasimhan Jegadeesh, Josef Lakonishok - Journal of Finance , 1996
"... We examine whether the predictability of future returns from past returns is due to the market's underreaction to information, in particular to past earnings news. Past return and past earnings surprise each predict large drifts in future returns after controlling for the other. Market risk, si ..."
Abstract - Cited by 334 (4 self) - Add to MetaCart
past performance. The results suggest a market that responds only gradually to new information. AN EXTENSIVE BODY OF RECENT finance literature documents that the crosssection of stock returns is predictable based on past returns. For example, DeBondt and Thaler (1985, 1987)report that long-term past

Long-term Interest Rates under Inflation Targeting:

by Hakan Berument, Richard T. Froyen , 2009
"... One advantage cited for formal inflation targeting is that by anchoring inflationary expectations such a policy framework would aid in the pricing of long-term securities. Long-term interest rates would become less sensitive to temporary shocks to the economy including policy induced changes in shor ..."
Abstract - Add to MetaCart
One advantage cited for formal inflation targeting is that by anchoring inflationary expectations such a policy framework would aid in the pricing of long-term securities. Long-term interest rates would become less sensitive to temporary shocks to the economy including policy induced changes

long-term

by Peter Gullestad, Asgeir Aglen, Geir Blom, Sverre Johansen, Jørn Krog, Ole Arve Misund, Ingolf Røttingen
"... management framework to prevent overfishing and to secure ..."
Abstract - Add to MetaCart
management framework to prevent overfishing and to secure
Next 10 →
Results 1 - 10 of 3,195
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University