메뉴 건너뛰기




Volumn , Issue , 2005, Pages 78-93

A cryptographically sound Dolev-Yao style security proof of an electronic payment system

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; MATHEMATICAL MODELS; NETWORK PROTOCOLS; POLYNOMIALS; THEOREM PROVING;

EID: 28144458018     PISSN: 10636900     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (15)

References (58)
  • 1
    • 0003092378 scopus 로고    scopus 로고
    • A calculus for cryptographic protocols: The spi calculus
    • M. Abadi and A. D. Gordon. A calculus for cryptographic protocols: The spi calculus. Information and Computation, 148(1): 1-70, 1999.
    • (1999) Information and Computation , vol.148 , Issue.1 , pp. 1-70
    • Abadi, M.1    Gordon, A.D.2
  • 3
    • 84879078812 scopus 로고    scopus 로고
    • Reconciling two views of cryptography: The computational soundness of formal encryption
    • Proc. 1st IFIP International Conference on Theoretical Computer Science. Springer
    • M. Abadi and P. Rogaway. Reconciling two views of cryptography: The computational soundness of formal encryption. In Proc. 1st IFIP International Conference on Theoretical Computer Science, volume 1872 of LNCS, pages 3-22. Springer, 2000.
    • (2000) LNCS , vol.1872 , pp. 3-22
    • Abadi, M.1    Rogaway, P.2
  • 5
    • 35048863550 scopus 로고    scopus 로고
    • A cryptographically sound Dolev-Yao style security proof of the Otway-Rees protocol
    • Proc. 9th European Symposium on Research in Computer Security (ESORICS). Springer
    • M. Backes. A cryptographically sound Dolev-Yao style security proof of the Otway-Rees protocol. In Proc. 9th European Symposium on Research in Computer Security (ESORICS), volume 3193 of LNCS, pages 89-108. Springer, 2004.
    • (2004) LNCS , vol.3193 , pp. 89-108
    • Backes, M.1
  • 6
    • 35248899328 scopus 로고    scopus 로고
    • Cryptographically sound and machine-assisted verification of security protocols
    • Proc. 20th Annual Symposium on Theoretical Aspects of Computer Science (STACS). Springer
    • M. Backes and C. Jacobi. Cryptographically sound and machine-assisted verification of security protocols. In Proc. 20th Annual Symposium on Theoretical Aspects of Computer Science (STACS), volume 2607 of LNCS, pages 675-686. Springer, 2003.
    • (2003) LNCS , vol.2607 , pp. 675-686
    • Backes, M.1    Jacobi, C.2
  • 8
    • 1442292329 scopus 로고    scopus 로고
    • A composable cryptographic library with nested operations
    • Full version in IACR Cryptology ePrint Archive 2003/015, Jan. 2003
    • M. Backes, B. Pfitzmann, and M. Waidner. A composable cryptographic library with nested operations (extended abstract). In Proc. 10th ACM Conference on Computer and Communications Security, pages 220-230, 2003. Full version in IACR Cryptology ePrint Archive 2003/015, Jan. 2003, http://eprint.iacr.org/.
    • (2003) Proc. 10th ACM Conference on Computer and Communications Security , pp. 220-230
    • Backes, M.1    Pfitzmann, B.2    Waidner, M.3
  • 10
    • 33746365751 scopus 로고
    • Secure multiparty protocols and zero knowledge proof systems tolerating a faulty minority
    • D. Beaver. Secure multiparty protocols and zero knowledge proof systems tolerating a faulty minority. Journal of Cryptology, 4(2):75-122, 1991.
    • (1991) Journal of Cryptology , vol.4 , Issue.2 , pp. 75-122
    • Beaver, D.1
  • 11
    • 84944035753 scopus 로고    scopus 로고
    • Formal verification of cardholder registration in SET
    • Proc. 6th European Symposium on Research in Computer Security (ESORICS). Springer
    • G. Bella, F. Massacci, L. C. Paulson, and P. Tramontano. Formal verification of cardholder registration in SET. In Proc. 6th European Symposium on Research in Computer Security (ESORICS), volume 1895 of LNCS, pages 159-174. Springer, 2000.
    • (2000) LNCS , vol.1895 , pp. 159-174
    • Bella, G.1    Massacci, F.2    Paulson, L.C.3    Tramontano, P.4
  • 15
    • 84945119254 scopus 로고
    • Entity authentication and key distribution
    • Advances in Cryptology: CRYPTO '93. Springer
    • M. Bellare and P. Rogaway. Entity authentication and key distribution. In Advances in Cryptology: CRYPTO '93, volume 773 of LNCS, pages 232-249. Springer, 1994.
    • (1994) LNCS , vol.773 , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 19
    • 0000731055 scopus 로고    scopus 로고
    • Security and composition of multiparty cryptographic protocols
    • R. Canetti. Security and composition of multiparty cryptographic protocols. Journal of Cryptology, 3(1): 143-202, 2000.
    • (2000) Journal of Cryptology , vol.3 , Issue.1 , pp. 143-202
    • Canetti, R.1
  • 20
    • 0035163054 scopus 로고    scopus 로고
    • Universally composable security: A new paradigm for cryptographic protocols
    • Extended version in Cryptology ePrint Archive, Report 2000/67
    • R. Canetti. Universally composable security: A new paradigm for cryptographic protocols. In Proc. 42nd IEEE Symposium on Foundations of Computer Science (FOCS), pages 136-145, 2001. Extended version in Cryptology ePrint Archive, Report 2000/67, http://eprint.iacr.org/.
    • (2001) Proc. 42nd IEEE Symposium on Foundations of Computer Science (FOCS) , pp. 136-145
    • Canetti, R.1
  • 22
    • 24344464253 scopus 로고    scopus 로고
    • Universally composable symbolic analysis of cryptographic protocols (the case of encryption-based mutual authentication and key exchange)
    • R. Canetti and J. Herzog. Universally composable symbolic analysis of cryptographic protocols (the case of encryption-based mutual authentication and key exchange). Cryptology ePrint Archive, Report 2004/334, 2004. http://eprint. iacr.org/.
    • (2004) Cryptology EPrint Archive, Report , vol.2004 , Issue.334
    • Canetti, R.1    Herzog, J.2
  • 23
    • 0020915882 scopus 로고
    • Blind signatures for untraceable payments
    • D. Chaum. Blind signatures for untraceable payments. In Advances in Cryptology: CRYPTO'82, pages 199-203, 1983.
    • (1983) Advances in Cryptology: CRYPTO'82 , pp. 199-203
    • Chaum, D.1
  • 24
    • 0022145479 scopus 로고
    • Security without identification: Transaction systems to make Big Brother obsolete
    • D. Chaum. Security without identification: Transaction systems to make Big Brother obsolete. Communications of the ACM, 28:1030-1044, 1985.
    • (1985) Communications of the ACM , vol.28 , pp. 1030-1044
    • Chaum, D.1
  • 25
    • 26444601400 scopus 로고
    • Online cash checks
    • Advances in Cryptology: EUROCRYPT'89
    • D. Chaum. Online cash checks. In Advances in Cryptology: EUROCRYPT'89, volume 434 of LNCS, pages 288-293, 1989.
    • (1989) LNCS , vol.434 , pp. 288-293
    • Chaum, D.1
  • 26
    • 85028762150 scopus 로고
    • Efficient offline electronic checks
    • Advances in Cryptology: EUROCRYPT'89
    • D. Chaum, B. den Boer, E. van Heyst, S. F. Mjolsnes, and A. Steenbeek. Efficient offline electronic checks (extended abstract). In Advances in Cryptology: EUROCRYPT'89, volume 434 of LNCS, pages 294-301, 1989.
    • (1989) LNCS , vol.434 , pp. 294-301
    • Chaum, D.1    Den Boer, B.2    Van Heyst, E.3    Mjolsnes, S.F.4    Steenbeek, A.5
  • 27
    • 84929273746 scopus 로고
    • Untraceable electronic cash
    • Advances in Cryptology: CRYPTO'88
    • D. Chaum, A. Fiat, and M. Naor. Untraceable electronic cash. In Advances in Cryptology: CRYPTO'88, volume 403 of LNCS, pages 319-327, 1988.
    • (1988) LNCS , vol.403 , pp. 319-327
    • Chaum, D.1    Fiat, A.2    Naor, M.3
  • 28
    • 84921069195 scopus 로고    scopus 로고
    • New generation of secure and practical RSA-based signatures
    • Advances in Cryptology: CRYPTO '96. Springer
    • R. Cramer and I. Damgård. New generation of secure and practical RSA-based signatures, In Advances in Cryptology: CRYPTO '96, volume 1109 of LNCS, pages 173-185. Springer, 1996.
    • (1996) LNCS , vol.1109 , pp. 173-185
    • Cramer, R.1    Damgård, I.2
  • 30
    • 0010250829 scopus 로고    scopus 로고
    • An efficient existentially unforgeable signature scheme and its applications
    • C. Dwork and M. Naor. An efficient existentially unforgeable signature scheme and its applications. Journal of Cryptology, 11 (3):187-208, 1998.
    • (1998) Journal of Cryptology , vol.11 , Issue.3 , pp. 187-208
    • Dwork, C.1    Naor, M.2
  • 32
    • 84955564077 scopus 로고
    • Fair computation of general functions in presence of immoral majority
    • Advances in Cryptology: CRYPTO '90, Springer
    • S. Goldwasser and L. Levin. Fair computation of general functions in presence of immoral majority. In Advances in Cryptology: CRYPTO '90, volume 537 of LNCS, pages 77-93. Springer, 1990.
    • (1990) LNCS , vol.537 , pp. 77-93
    • Goldwasser, S.1    Levin, L.2
  • 34
    • 0023985465 scopus 로고
    • A digital signature scheme secure against adaptive chosen-message attacks
    • S. Goldwasser, S. Micali, and R. L. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal on Computing, 17(2):281-308, 1988.
    • (1988) SIAM Journal on Computing , vol.17 , Issue.2 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.L.3
  • 36
    • 35248848005 scopus 로고    scopus 로고
    • Plaintext awareness via key registration
    • Advances in Cryptology: CRYPTO 2003. Springer
    • J. Herzog, M. Liskov, and S. Micali. Plaintext awareness via key registration. In Advances in Cryptology: CRYPTO 2003, volume 2729 of LNCS, pages 548-564. Springer, 2003.
    • (2003) LNCS , vol.2729 , pp. 548-564
    • Herzog, J.1    Liskov, M.2    Micali, S.3
  • 38
    • 0029210095 scopus 로고
    • Reasoning about accountability in protocols for electronic commerce
    • R. Kailar. Reasoning about accountability in protocols for electronic commerce. In Proc. 16th IEEE Symposium on Security & Privacy, pages 236-250, 1995.
    • (1995) Proc. 16th IEEE Symposium on Security & Privacy , pp. 236-250
    • Kailar, R.1
  • 39
    • 0024665744 scopus 로고
    • Analyzing encryption protocols using formal verification techniques
    • R. Kemmerer. Analyzing encryption protocols using formal verification techniques. IEEE Journal on Selected Areas in Communications, 7(4):448-457, 1989.
    • (1989) IEEE Journal on Selected Areas in Communications , vol.7 , Issue.4 , pp. 448-457
    • Kemmerer, R.1
  • 40
    • 84958771467 scopus 로고    scopus 로고
    • A sound logic for analysing electronic commerce protocols
    • Proc. 5th European Symposium on Research in Computer Security (ESORICS). Springer
    • V. Kessler and H. Neumann. A sound logic for analysing electronic commerce protocols. In Proc. 5th European Symposium on Research in Computer Security (ESORICS), volume 1485 of LNCS, pages 345-360. Springer, 1998.
    • (1998) LNCS , vol.1485 , pp. 345-360
    • Kessler, V.1    Neumann, H.2
  • 41
    • 84945249768 scopus 로고    scopus 로고
    • Semantics and program analysis of computationally secure information flow
    • P. Laud. Semantics and program analysis of computationally secure information flow. In Proc. 10th European Symposium on Programming (ESOP), pages 77-91, 2001.
    • (2001) Proc. 10th European Symposium on Programming (ESOP) , pp. 77-91
    • Laud, P.1
  • 44
    • 0024665570 scopus 로고
    • Using narrowing in the analysis of key management protocols
    • C. Meadows. Using narrowing in the analysis of key management protocols. In Proc. 10th IEEE Symposium on Security & Privacy, pages 138-147, 1989.
    • (1989) Proc. 10th IEEE Symposium on Security & Privacy , pp. 138-147
    • Meadows, C.1
  • 45
    • 84958035071 scopus 로고    scopus 로고
    • A formal specification of requirements for payment transactions in the SET protocol
    • Proc. 2nd Financial Cryptography Conference (FC). Springer
    • C. Meadows and P. Syverson. A formal specification of requirements for payment transactions in the SET protocol. In Proc. 2nd Financial Cryptography Conference (FC), volume 1465 of LNCS, pages 122-140. Springer, 1998.
    • (1998) LNCS , vol.1465 , pp. 122-140
    • Meadows, C.1    Syverson, P.2
  • 46
    • 84974655726 scopus 로고
    • Secure computation
    • Advances in Cryptology: CRYPTO '91. Springer
    • S. Micali and P. Rogaway. Secure computation. In Advances in Cryptology: CRYPTO '91, volume 576 of LNCS, pages 392-404. Springer, 1991.
    • (1991) LNCS , vol.576 , pp. 392-404
    • Micali, S.1    Rogaway, P.2
  • 47
    • 35048899313 scopus 로고    scopus 로고
    • Soundness of formal encryption in the presence of active adversaries
    • Proc. 1st Theory of Cryptography Conference (TCC). Springer
    • D. Micciancio and B. Warinschi. Soundness of formal encryption in the presence of active adversaries. In Proc. 1st Theory of Cryptography Conference (TCC), volume 2951 of LNCS, pages 133-151. Springer, 2004.
    • (2004) LNCS , vol.2951 , pp. 133-151
    • Micciancio, D.1    Warinschi, B.2
  • 48
    • 0021190844 scopus 로고
    • The interrogator: A tool for cryptographic protocol security
    • J. K. Millen. The interrogator: A tool for cryptographic protocol security. In Proc. 5th IEEE Symposium on Security & Privacy, pages 134-141, 1984.
    • (1984) Proc. 5th IEEE Symposium on Security & Privacy , pp. 134-141
    • Millen, J.K.1
  • 50
    • 0345280512 scopus 로고    scopus 로고
    • A probabilistic polynominal-time process calculus for analysis of cryptographic protocols (preliminary report)
    • J. Mitchell, M. Mitchell, A. Scedrov, and V. Teague. A probabilistic polynominal-time process calculus for analysis of cryptographic protocols (preliminary report). Electronic Notes in Theoretical Computer Science, 47:1-31, 2001.
    • (2001) Electronic Notes in Theoretical Computer Science , vol.47 , pp. 1-31
    • Mitchell, J.1    Mitchell, M.2    Scedrov, A.3    Teague, V.4
  • 51
    • 85024576592 scopus 로고
    • Universal electronic cash
    • Advances in Cryptology: CRYPTO '91. Springer
    • T. Okamoto and K. Ohta. Universal electronic cash. In Advances in Cryptology: CRYPTO '91, volume 576 of LNCS, pages 324-337. Springer, 1992.
    • (1992) LNCS , vol.576 , pp. 324-337
    • Okamoto, T.1    Ohta, K.2
  • 52
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • L. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Cryptology, 6(1):85-128, 1998.
    • (1998) Journal of Cryptology , vol.6 , Issue.1 , pp. 85-128
    • Paulson, L.1
  • 53
    • 84957699896 scopus 로고
    • How to break another "provably secure" payment system
    • Advances in Cryptology: EUROCRYPT '95. Springer
    • B. Pfitzmann, M. Schunter, and M. Waidner. How to break another "provably secure" payment system. In Advances in Cryptology: EUROCRYPT '95, volume 921 of LNCS, pages 121-132. Springer, 1995.
    • (1995) LNCS , vol.921 , pp. 121-132
    • Pfitzmann, B.1    Schunter, M.2    Waidner, M.3
  • 54
    • 84964980361 scopus 로고
    • How to break and repair a "provably secure" untraceable payment system
    • Advances in Cryptology: CRYPTO '91. Springer
    • B. Pfitzmann and M. Waidner. How to break and repair a "provably secure" untraceable payment system. In Advances in Cryptology: CRYPTO '91, volume 576 of LNCS, pages 338-350. Springer, 1992.
    • (1992) LNCS , vol.576 , pp. 338-350
    • Pfitzmann, B.1    Waidner, M.2
  • 56
    • 0034823388 scopus 로고    scopus 로고
    • A model for asynchronous reactive systems and its application to secure message transmission
    • Extended version of the model (with Michael Backes) IACR Cryptology ePrint Archive 2004/082
    • B. Pfitzmann and M. Waidner. A model for asynchronous reactive systems and its application to secure message transmission. In Proc. 22nd IEEE Symposium on Security & Privacy, pages 184-200, 2001. Extended version of the model (with Michael Backes) IACR Cryptology ePrint Archive 2004/082.
    • (2001) Proc. 22nd IEEE Symposium on Security & Privacy , pp. 184-200
    • Pfitzmann, B.1    Waidner, M.2
  • 57
    • 0035072287 scopus 로고    scopus 로고
    • Athena: A novel approach to efficient automatic security protocol analysis
    • D. X. Song, S. Berezin, and A. Perrig. Athena: A novel approach to efficient automatic security protocol analysis. Journal of Computer Security, 9(1/2):47-74, 2001.
    • (2001) Journal of Computer Security , vol.9 , Issue.1-2 , pp. 47-74
    • Song, D.X.1    Berezin, S.2    Perrig, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.