{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,6]],"date-time":"2022-04-06T03:21:46Z","timestamp":1649215306061},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2016,12,13]],"date-time":"2016-12-13T00:00:00Z","timestamp":1481587200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2017,1]]},"DOI":"10.1007\/s11623-017-0720-4","type":"journal-article","created":{"date-parts":[[2016,12,12]],"date-time":"2016-12-12T00:32:48Z","timestamp":1481502768000},"page":"24-28","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Sicherheit relativ definieren"],"prefix":"10.1007","volume":"41","author":[{"given":"Brandon","family":"Broadnax","sequence":"first","affiliation":[]},{"given":"Jeremias","family":"Mechler","sequence":"additional","affiliation":[]},{"given":"J\u00f6rn","family":"M\u00fcller-Quade","sequence":"additional","affiliation":[]},{"given":"Matthias","family":"Nagel","sequence":"additional","affiliation":[]},{"given":"Jochen","family":"Rill","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,12,13]]},"reference":[{"key":"720_CR1","unstructured":"Introduction to modern cryptography. CRC press, 2014."},{"key":"720_CR2","volume-title":"Foundations of Computer Science, 2001. Proceedings. 42nd IEEE Symposium on. IEEE","author":"C. Ran","year":"2001","unstructured":"Canetti, Ran. \u201cUniversally composable security: A new paradigm for cryptographic protocols.\u201d Foundations of Computer Science, 2001. Proceedings. 42nd IEEE Symposium on. IEEE, 2001."},{"key":"720_CR3","volume-title":"Theory of Cryptography Conference","author":"B. Michael","year":"2004","unstructured":"Backes, Michael, Birgit Pfitzmann, and Michael Waidner. \u201cA general composition theorem for secure reactive systems.\u201d Theory of Cryptography Conference. Springer Berlin Heidelberg, 2004"},{"key":"720_CR4","first-page":"423","volume":"28.3","author":"H. Dennis","year":"2015","unstructured":"Hofheinz, Dennis, and Victor Shoup. \u201cGNUC: A new universal composability framework.\u201d Journal of Cryptology 28.3 (2015): 423\u2013508","journal-title":"Journal of Cryptology"},{"key":"720_CR5","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/3-540-44647-8_2","volume-title":"Advances in Cryptology\u2013CRYPTO 2001: 21st Annual International Cryptology Conference","author":"R. Canetti","year":"2001","unstructured":"Ran Canetti and Marc Fischlin.\u201cUniversally composable commitments\u201d. In: Advances in Cryptology\u2013CRYPTO 2001: 21st Annual International Cryptology Conference, Proceedings. Springer, 2001, pp.19\u201340."},{"key":"720_CR6","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1007\/3-540-39200-9_5","volume-title":"Advances in Cryptology\u2013EUROCRYPT 2003:, Proceedings","author":"R. Canetti","year":"2003","unstructured":"Ran Canetti, Eyal Kushilevitz, and Yehuda Lindell. \u201cOn the Limita-tions of Universally Composable Two-Party Computation without Set-up Assumptions\u201d. In: Advances in Cryptology\u2013EUROCRYPT 2003:, Proceedings. Springer, 2003,pp. 68\u201386."},{"key":"720_CR7","first-page":"369","volume":"2007","author":"V. Goyal","year":"2007","unstructured":"Vipul Goyal, Jonathan Katz \u201cUniversally Composable Multi-Party Computation with an Unreliable Common Reference String.\u201d IACR Cryptology ePrint Archive 2007: 369 (2007)","journal-title":"IACR Cryptology ePrint Archive"},{"key":"720_CR8","first-page":"186","volume-title":"Universally Composable Protocols with Relaxed Set-Up Assumptions","author":"B. Barak","year":"2004","unstructured":"Boaz Barak, Ran Canetti, Jesper Buus Nielsen, Rafael Pass \u201cUniversally Composable Protocols with Relaxed Set-Up Assumptions\u201d FOCS 2004: 186\u2013195"},{"key":"720_CR9","first-page":"61","volume-title":"Universally Composable Security with Global Setup","author":"R. Canetti","year":"2007","unstructured":"Ran Canetti, Yevgeniy Dodis, Rafael Pass, Shabsi Walfish \u201cUniversally Composable Security with Global Setup\u201d TCC 2007: 61\u201385"},{"key":"720_CR10","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/978-3-540-72540-4_7","volume-title":"EUROCRYPT 2007","author":"J. Katz","year":"2007","unstructured":"Jonathan Katz. \u201cUniversally composable multi-party computation using tamper-proof hardware\u201d. In Moni Naor, editor, EUROCRYPT 2007, volume 4515 of LNCS, pages 115\u2013128. Springer, Heidelberg, May 2007."},{"key":"720_CR11","first-page":"164","volume-title":"TCC 2011","author":"N. D\u00f6ttling","year":"2011","unstructured":"Nico D\u00f6ttling, Daniel Kraschewski, and J\u00f6rn M\u00fcller-Quade. Unconditional and composable security using a single stateful tamper-proof hardware token. In Yuval Ishai, editor, TCC 2011, volume 6597 of LNCS, pages 164\u2013181. Springer, Heidelberg, March 2011"},{"key":"720_CR12","first-page":"615","volume":"2016","author":"J. Mechler","year":"2016","unstructured":"Jeremias Mechler, J\u00f6rn M\u00fcller-Quade, Tobias Nilges Universally Composable (Non-Interactive) Two-Party Computation from Untrusted Reusable Hardware Tokens IACR Cryptology ePrint Archive 2016: 615 (2016)","journal-title":"Tobias Nilges Universally Composable (Non-Interactive) Two-Party Computation from Untrusted Reusable Hardware Tokens IACR Cryptology ePrint Archive"},{"key":"720_CR13","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1007\/3-540-39200-9_10","volume-title":"Advances in Cryptology\u2013EUROCRYPT 2003: 22nd Annual International Conference on the Theory and Applications of Cryptographic Techniques","author":"R. Pass","year":"2003","unstructured":"Rafael Pass. \u201cSimulation in Quasi-Polynomial Time, and Its Application to Protocol Composition\u201d In: Advances in Cryptology\u2013EUROCRYPT 2003: 22nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Springer, 2003, pp. 160\u2013176."},{"key":"720_CR14","first-page":"543","volume-title":"46st Annual IEEE Symposium on Foundations of Computer Science. FOCS \u201805","author":"B. Barak","year":"2005","unstructured":"Boaz Barak and Amit Sahai. \u201dHow to play almost any mental game over the net\u2013concurrent composition via super-polynomial simulation\u201d. In: 46st Annual IEEE Symposium on Foundations of Computer Science. FOCS \u201805. IEEE. 2005, pp. 543\u2013552."},{"key":"720_CR15","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1145\/1536414.1536441","volume-title":"Proceedings of the 41st Annual ACM Symposium on Theory of Computing. STOC \u201809","author":"H. Lin","year":"2009","unstructured":"Huijia Lin, Rafael Pass, and Muthuramakrishnan Venkitasubramaniam. \u201cA Unified Framework for Concurrent Security: Universal Composability from Stand-alone Non-malleability\u201d. In: Proceedings of the 41st Annual ACM Symposium on Theory of Computing. STOC \u201809. ACM, 2009, pp. 179\u2013188."},{"key":"720_CR16","first-page":"699","volume-title":"Advances in Cryptology\u2013ASIACRYPT 2012: 18th International Conference on the Theory and Application of Cryptology and Information Security","author":"H. Lin","year":"2012","unstructured":"Huijia Lin, Rafael Pass, and Muthuramakrishnan Venkitasubramaniam. \u201cA Unified Framework for UC from Only OT\u201d. In: Advances in Cryptology\u2013ASIACRYPT 2012: 18th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Springer, 2012, pp. 699\u2013717."},{"key":"720_CR17","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1145\/1007352.1007394","volume-title":"Proceedings of the 36th Annual ACM Symposium on Theory of Computing. STOC\u2019 04","author":"M. Prabhakaran","year":"2004","unstructured":"Manoj Prabhakaran and Amit Sahai. \u201cNew Notions of Security: Achieving Universal Composability Without Trusted Setup\u201d. In: Proceedings of the 36th Annual ACM Symposium on Theory of Computing. STOC\u2019 04. ACM, 2004, pp. 242\u2013251."},{"key":"720_CR18","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1109\/FOCS.2010.86","volume-title":"51st Annual IEEE Symposium on Foundations of Computer Science","author":"R. Canetti","year":"2010","unstructured":"Ran Canetti, Huijia Lin, and Rafael Pass. \u201cAdaptive hardness and composable security in the plain model from standard assumptions\u201d. In: 51st Annual IEEE Symposium on Foundations of Computer Science. FOCS\u2019 10. IEEE. 2010, pp. 541\u2013550."},{"key":"720_CR19","first-page":"1043","volume":"2016","author":"B. Braodnax","year":"2016","unstructured":"Brandon Braodnax, Nico D\u00f6ttling, Gunnar Hartung, J\u00f6rn M\u00fcller-Quade, Matthias Nagel. \u201cConcurrently Composable Security With Shielded Super-polynomial Simulators\u201d IACR Cryptology ePrint Archive 2016: 1043 (2016)","journal-title":"IACR Cryptology ePrint Archive"},{"key":"720_CR20","first-page":"57","volume-title":"Universally Composable Firewall Architectures Using Trusted Hardware","author":"D. Achenbach","year":"2014","unstructured":"Dirk Achenbach, J\u00f6rn M\u00fcller-Quade, Jochen Rill: \u201cUniversally Composable Firewall Architectures Using Trusted Hardware\u201d. BalkanCryptSec 2014: 57\u20137"},{"key":"720_CR21","first-page":"95","volume-title":"Synchronous Universally Composable Computer Neworks","author":"D. Achenbach","year":"2015","unstructured":"Dirk Achenbach, J\u00f6rn M\u00fcller-Quade, Jochen Rill: Synchronous Universally Composable Computer Neworks. BalkanCryptSec 2015: 95\u2013111"},{"key":"720_CR22","first-page":"431","volume":"43.3","author":"G. Oded","year":"1996","unstructured":"Goldreich, Oded, and Rafail Ostrovsky. \u201cSoftware protection and simulation on oblivious RAMs.\u201d Journal of the ACM (JACM) 43.3 (1996): 431\u2013473.","journal-title":"Journal of the ACM (JACM)"},{"key":"720_CR23","volume-title":"Program obfuscation with leaky hardware","author":"B. Nir","year":"2011","unstructured":"Bitansky, Nir, et al. \u201cProgram obfuscation with leaky hardware.\u201d International Conference on the Theory and Application of Cryptology and Information Security. Springer Berlin Heidelberg, 2011."},{"key":"720_CR24","volume-title":"Implementing resettable UC-functionalities with untrusted tamper-proof hardware-tokens","author":"D. Nico","year":"2013","unstructured":"D\u00f6ttling, Nico, et al. \u201cImplementing resettable UC-functionalities with untrusted tamper-proof hardware-tokens.\u201d Theory of Cryptography Conference. Springer Berlin Heidelberg, 2013."}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-017-0720-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-017-0720-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-017-0720-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,16]],"date-time":"2019-09-16T08:11:40Z","timestamp":1568621500000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-017-0720-4"}},"subtitle":["Das Real\/Ideal-Paradigma in der Kryptographie"],"short-title":[],"issued":{"date-parts":[[2016,12,13]]},"references-count":24,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2017,1]]}},"alternative-id":["720"],"URL":"https:\/\/doi.org\/10.1007\/s11623-017-0720-4","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,12,13]]}}}