메뉴 건너뛰기




Volumn 3378, Issue , 2005, Pages 169-187

Adaptive security of symbolic encryption

Author keywords

Adaptive adversaries; Formal methods for security protocols; Soundness theorem; Symbolic encryption

Indexed keywords

COMPUTATIONAL METHODS; MULTICASTING; NETWORK PROTOCOLS; PUBLIC KEY CRYPTOGRAPHY; THEOREM PROVING;

EID: 24144482305     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/978-3-540-30576-7_10     Document Type: Conference Paper
Times cited : (29)

References (23)
  • 1
    • 84978977131 scopus 로고    scopus 로고
    • Formal eavesdropping and its computational interpretation
    • N. Kobayashi and B. Pierce, editors, Proceedings of the 4th International Symposium on Theoretical Aspects of Computer Software - TACS 2001, Sendai, Japan, Oct. Springer-Verlag
    • M. Abadi and J. Jürjens. Formal eavesdropping and its computational interpretation. In N. Kobayashi and B. Pierce, editors, Proceedings of the 4th International Symposium on Theoretical Aspects of Computer Software - TACS 2001, volume 2215 of Lecture Notes in Computer Science, pages 82-94, Sendai, Japan, Oct. 2001. Springer-Verlag.
    • (2001) Lecture Notes in Computer Science , vol.2215 , pp. 82-94
    • Abadi, M.1    Jürjens, J.2
  • 2
    • 85083027758 scopus 로고    scopus 로고
    • Reconciling two views of cryptography (the computational soundness of formal encryption)
    • M. Abadi and P. Rogaway. Reconciling two views of cryptography (the computational soundness of formal encryption). Journal of Cryptology, 15(2): 103-127, 2002.
    • (2002) Journal of Cryptology , vol.15 , Issue.2 , pp. 103-127
    • Abadi, M.1    Rogaway, P.2
  • 3
    • 4944234643 scopus 로고    scopus 로고
    • Symmetric encryption in a simulatable Dolev-Yao style cryptographic library
    • Pacific Grove, CA, USA, June. IEEE Computer Society
    • M. Backes and B. Pfitzmann. Symmetric encryption in a simulatable Dolev-Yao style cryptographic library. In Proceedings of the 17th IEEE computer security foundations Workshop, pages 204-218, Pacific Grove, CA, USA, June 2004. IEEE Computer Society.
    • (2004) Proceedings of the 17th IEEE Computer Security Foundations Workshop , pp. 204-218
    • Backes, M.1    Pfitzmann, B.2
  • 7
    • 84957623200 scopus 로고    scopus 로고
    • Efficient communication-storage tradeoffs for multicast encryption
    • J. Stern, editor, Advances in Cryptology - EUROCRYPT '99, Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May. Springer-Verlag
    • R. Canetti, T. Malkin, and K. Nissim. Efficient communication-storage tradeoffs for multicast encryption. In J. Stern, editor, Advances in Cryptology - EUROCRYPT '99, Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, volume 1592 of Lecture Notes in Computer Science, Prague, Czech Republic, May 1999. Springer-Verlag.
    • (1999) Lecture Notes in Computer Science , vol.1592
    • Canetti, R.1    Malkin, T.2    Nissim, K.3
  • 8
    • 0343337504 scopus 로고    scopus 로고
    • Nonmalleable cyptography
    • Preliminary version in STOC 1991
    • D. Dolev, C. Dwork, and M. Naor. Nonmalleable Cyptography. SIAM Journal on Computing, 30(2):391-437, 2000. Preliminary version in STOC 1991.
    • (2000) SIAM Journal on Computing , vol.30 , Issue.2 , pp. 391-437
    • Dolev, D.1    Dwork, C.2    Naor, M.3
  • 10
    • 24144446250 scopus 로고    scopus 로고
    • Weak key authenticity and the computational completeness of formal encryption
    • D. Boneh, editor, Advances in cryptology CRYPTO 2003, proceedings of the 23rd annual international cryptology conference, Santa Barbara, California, USA, Aug. Springer-Verlag
    • V. Gligor and D. O. Horvitz. Weak Key Authenticity and the Computational Completeness of Formal Encryption. In D. Boneh, editor, Advances in cryptology CRYPTO 2003, proceedings of the 23rd annual international cryptology conference, volume 2729 of Lecture Notes in Computer Science, pages 530-547, Santa Barbara, California, USA, Aug. 2003. Springer-Verlag.
    • (2003) Lecture Notes in Computer Science , vol.2729 , pp. 530-547
    • Gligor, V.1    Horvitz, D.O.2
  • 11
    • 0021409284 scopus 로고
    • Probabilistic encryption
    • Preliminary version in Proc. of STOC 1982
    • S. Goldwasser and S. Micali. Probabilistic encryption. Journal of Computer and System Sience, 28(2):270-299, 1984. Preliminary version in Proc. of STOC 1982.
    • (1984) Journal of Computer and System Sience , vol.28 , Issue.2 , pp. 270-299
    • Goldwasser, S.1    Micali, S.2
  • 14
    • 3543052976 scopus 로고    scopus 로고
    • Symmetric encryption in automatic analyses for confidentiality against active adversaries
    • Berkeley, CA, USA, May. IEEE Computer Society
    • P. Laud. Symmetric Encryption in Automatic Analyses for Confidentiality against Active Adversaries. In IEEE symposium on security and Privacy, pages 71-85, Berkeley, CA, USA, May 2004. IEEE Computer Society.
    • (2004) IEEE Symposium on Security and Privacy , pp. 71-85
    • Laud, P.1
  • 18
    • 25444488186 scopus 로고    scopus 로고
    • Optimal communication complexity of generic multicast key distributio
    • C. Cachin and J. Camenisch, editors, Advances in cryptology - EUROCRYPT 2004, proceedings of the internarional conference on the theory and application of cryptographic techniques, Interlaken, Switzerland, May. Springer-Verlag
    • D. Micciancio and S. Panjwani. Optimal communication complexity of generic multicast key distributio. In C. Cachin and J. Camenisch, editors, Advances in cryptology - EUROCRYPT 2004, proceedings of the internarional conference on the theory and application of cryptographic techniques, volume 3027 of Lecture Notes in Computer Science, Interlaken, Switzerland, May 2004. Springer-Verlag.
    • (2004) Lecture Notes in Computer Science , vol.3027
    • Micciancio, D.1    Panjwani, S.2
  • 19
    • 0344875571 scopus 로고    scopus 로고
    • Completeness theorems for the abadi-rogaway logic of encrypted expressions
    • Preliminary version in WITS 2002
    • D. Micciancio and B. Warinschi. Completeness theorems for the abadi-rogaway logic of encrypted expressions. Journal of Computer Security, 12(1):99-129, 2004. Preliminary version in WITS 2002.
    • (2004) Journal of Computer Security , vol.12 , Issue.1 , pp. 99-129
    • Micciancio, D.1    Warinschi, B.2
  • 20
    • 35048899313 scopus 로고    scopus 로고
    • Soundness of formal encryption in the presence of active adversaries
    • M. Naor, editor, Theory of cryptography conference Proceedings of TCC 2004, Cambridge, MA, USA, Feb. Springer-Verlag
    • D. Micciancio and B. Warinschi. Soundness of Formal Encryption in the presence of Active Adversaries. In M. Naor, editor, Theory of cryptography conference Proceedings of TCC 2004, volume 2951 of Lecture Notes in Computer Science, pages 133-151, Cambridge, MA, USA, Feb. 2004. Springer-Verlag.
    • (2004) Lecture Notes in Computer Science , vol.2951 , pp. 133-151
    • Micciancio, D.1    Warinschi, B.2
  • 21
    • 0002360237 scopus 로고
    • Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack
    • J. Feigenbaum, editor, Advances in Cryptology - CRYPTO '91, Proceedings, Santa Barbara, California, USA, Aug. Springer-Verlag
    • C. Rackoff and D. R. Simon. Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack. In J. Feigenbaum, editor, Advances in Cryptology - CRYPTO '91, Proceedings, volume 576 of Lecture Notes in Computer Science, Santa Barbara, California, USA, Aug. 1991. Springer-Verlag.
    • (1991) Lecture Notes in Computer Science , vol.576
    • Rackoff, C.1    Simon, D.R.2
  • 22
    • 0345565893 scopus 로고    scopus 로고
    • A survey of key management for secure group communication
    • Sept.
    • S. Rafaeli and D. Hutchinson. A survey of key management for secure group communication. ACM Computing Surveys, 35(3):309-329, Sept. 2003.
    • (2003) ACM Computing Surveys , vol.35 , Issue.3 , pp. 309-329
    • Rafaeli, S.1    Hutchinson, D.2
  • 23
    • 0033893174 scopus 로고    scopus 로고
    • Secure group communications using key graphs
    • Feb. Preliminary version in SIGCOMM 1998
    • C. K. Wong, M. Gouda, and S. S. Lam. Secure group communications using key graphs. IEEE/ACM Transactions on Networking, 8(1): 16-30, Feb. 2000. Preliminary version in SIGCOMM 1998.
    • (2000) IEEE/ACM Transactions on Networking , vol.8 , Issue.1 , pp. 16-30
    • Wong, C.K.1    Gouda, M.2    Lam, S.S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.