메뉴 건너뛰기




Volumn , Issue , 2005, Pages 170-184

Computational and information-theoretic soundness and completeness of formal encryption

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTABILITY AND DECIDABILITY; COMPUTATIONAL COMPLEXITY; INFORMATION ANALYSIS; INFORMATION THEORY; PROBABILISTIC LOGICS;

EID: 28144460109     PISSN: 10636900     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (26)

References (21)
  • 1
    • 84978977131 scopus 로고    scopus 로고
    • Formal eavesdropping and its computational interpretation
    • Proc. 4th International Symposium on Theoretical Aspects of Computer Software (TACS), Sendai, Japan. Springer
    • M. Abadi and J. Jürjens. Formal eavesdropping and its computational interpretation. In Proc. 4th International Symposium on Theoretical Aspects of Computer Software (TACS), volume 2215 of LNCS, pages 82-94, Sendai, Japan, 2001. Springer.
    • (2001) LNCS , vol.2215 , pp. 82-94
    • Abadi, M.1    Jürjens, J.2
  • 2
    • 85083027758 scopus 로고    scopus 로고
    • Reconciling two views of cryptography (the computational soundness of formal encryption)
    • Preliminary version presented at IFIP TCS 2000
    • M. Abadi and P. Rogaway. Reconciling two views of cryptography (the computational soundness of formal encryption). Journal of Cryptology, 15(2):103-127, 2002. Preliminary version presented at IFIP TCS 2000.
    • (2002) Journal of Cryptology , vol.15 , Issue.2 , pp. 103-127
    • Abadi, M.1    Rogaway, P.2
  • 3
    • 1442292329 scopus 로고    scopus 로고
    • A composable cryptographic library with nested operations
    • Washington D.C., USA, ACM Press. Full version available at IACR ePrint Archive, Report 2003/015, January 2003
    • M. Backes, B. Pfitzmann, and M. Waidner. A composable cryptographic library with nested operations. In Proc. 10th ACM Conference on Computer and Communications Security (CCS), pages 220-230, Washington D.C., USA, 2003. ACM Press. Full version available at IACR ePrint Archive, Report 2003/015, January 2003.
    • (2003) Proc. 10th ACM Conference on Computer and Communications Security (CCS) , pp. 220-230
    • Backes, M.1    Pfitzmann, B.2    Waidner, M.3
  • 4
    • 26444574431 scopus 로고    scopus 로고
    • PhD thesis, University of Pennsylvania, Also available at IACR ePrint Archive
    • G. Bana. Soundness and Completeness of Formal Logics of Symmetric Encryption. PhD thesis, University of Pennsylvania, 2004. Available at www.math.upenn.edu/~bana/banaphdthesis.pdf. Also available at IACR ePrint Archive.
    • (2004) Soundness and Completeness of Formal Logics of Symmetric Encryption
    • Bana, G.1
  • 5
    • 0035163054 scopus 로고    scopus 로고
    • Universally composable security: A new paradigm for cryptographic protocols
    • Las Vegas, NV, USA, IEEE Computer Society. Full version available at IACR ePrint Archive, Report 2000/067
    • R. Canetti. Universally composable security: A new paradigm for cryptographic protocols. In 42nd IEEE Symposium on Foundations of Computer Science (FOCS), pages 136-145, Las Vegas, NV, USA, 2001. IEEE Computer Society. Full version available at IACR ePrint Archive, Report 2000/067.
    • (2001) 42nd IEEE Symposium on Foundations of Computer Science (FOCS) , pp. 136-145
    • Canetti, R.1
  • 6
    • 24644437051 scopus 로고    scopus 로고
    • Computationally sound, automated proofs for security protocols
    • Proc. 14th European Symposium on Programming (ESOP), Edinburgh, UK, Springer.
    • V. Cortier and B. Warinschi. Computationally sound, automated proofs for security protocols. In Proc. 14th European Symposium on Programming (ESOP), volume 3444 of LNCS, pages 157-171, Edinburgh, UK, 2005. Springer.
    • (2005) LNCS , vol.3444 , pp. 157-171
    • Cortier, V.1    Warinschi, B.2
  • 7
    • 0020720357 scopus 로고
    • On the security of public-key protocols
    • Preliminary version presented at FOCS'81
    • D. Dolev and A. C. Yao. On the security of public-key protocols. IEEE Transactions on Information Theory, 29(2):198-208, 1983. Preliminary version presented at FOCS'81.
    • (1983) IEEE Transactions on Information Theory , vol.29 , Issue.2 , pp. 198-208
    • Dolev, D.1    Yao, A.C.2
  • 8
    • 0021409284 scopus 로고
    • Probabilistic encryption
    • Preliminary version presented at STOC'82
    • S. Goldwasser and S. Micali. Probabilistic encryption. Journal of Computer and Systems Sciences, 28(2):270-299, 1984. Preliminary version presented at STOC'82.
    • (1984) Journal of Computer and Systems Sciences , vol.28 , Issue.2 , pp. 270-299
    • Goldwasser, S.1    Micali, S.2
  • 10
    • 35248848005 scopus 로고    scopus 로고
    • Plaintext awareness via key registration
    • Advances in Cryptology - CRYPTO 2003, Santa Barbara, CA, USA. Springer
    • J. Herzog, M. Liskov, and S. Micali. Plaintext awareness via key registration. In Advances in Cryptology - CRYPTO 2003, volume 2729 of LNCS, pages 548-564, Santa Barbara, CA, USA, 2003. Springer.
    • (2003) LNCS , vol.2729 , pp. 548-564
    • Herzog, J.1    Liskov, M.2    Micali, S.3
  • 11
    • 24144446250 scopus 로고    scopus 로고
    • Weak key authenticity and the computational completeness of formal encryption
    • Advances in Cryptology - CRYPTO 2003, Santa Barbara, CA, USA. Springer
    • O. Horvitz and V. Gligor. Weak key authenticity and the computational completeness of formal encryption. In Advances in Cryptology - CRYPTO 2003, volume 2729 of LNCS, pages 530-547, Santa Barbara, CA, USA, 2003. Springer.
    • (2003) LNCS , vol.2729 , pp. 530-547
    • Horvitz, O.1    Gligor, V.2
  • 12
    • 24644476184 scopus 로고    scopus 로고
    • Completing the picture: Soundness of formal encryption in the presence of active adversaries
    • Proc. 14th European Symposium on Programming (ESOP), Edinburgh, UK. Springer
    • R. Janvier, Y. Lakhnech, and L. Mazaré. Completing the picture: Soundness of formal encryption in the presence of active adversaries. In Proc. 14th European Symposium on Programming (ESOP), volume 3444 of LNCS, pages 172-185, Edinburgh, UK, 2005. Springer.
    • (2005) LNCS , vol.3444 , pp. 172-185
    • Janvier, R.1    Lakhnech, Y.2    Mazaré, L.3
  • 13
    • 28144443023 scopus 로고    scopus 로고
    • Encryption cycles and two views of cryptography
    • Karlstad, Sweden, Karlstad University Studies
    • P. Laud. Encryption cycles and two views of cryptography. In Proc. 7th Nordic Workshop on Secure IT Systems, number 31, pages 85-100, Karlstad, Sweden, 2002. Karlstad University Studies.
    • (2002) Proc. 7th Nordic Workshop on Secure IT Systems , vol.31 , pp. 85-100
    • Laud, P.1
  • 14
    • 35048855625 scopus 로고    scopus 로고
    • Sound computational interpretation of formal encryption with composed keys
    • Proc. 6th International Conference on Information Security and Cryptology (ICISC), Seoul, Korea. Springer
    • P. Laud and R. Corin. Sound computational interpretation of formal encryption with composed keys. In Proc. 6th International Conference on Information Security and Cryptology (ICISC), volume 2971 of LNCS, pages 55-66, Seoul, Korea, 2003. Springer.
    • (2003) LNCS , vol.2971 , pp. 55-66
    • Laud, P.1    Corin, R.2
  • 16
    • 84947240143 scopus 로고    scopus 로고
    • Indistinguishability of random systems
    • Advances in Cryptology - EUROCRYPT 2002, Amsterdam, The Netherlands. Springer
    • U. Maurer. Indistinguishability of random systems. In Advances in Cryptology - EUROCRYPT 2002, volume 2332 of LNCS, pages 110-132, Amsterdam, The Netherlands, 2002. Springer.
    • (2002) LNCS , vol.2332 , pp. 110-132
    • Maurer, U.1
  • 17
    • 24144482305 scopus 로고    scopus 로고
    • Adaptive security of symbolic encryption
    • Proc. 2nd Theory of Cryptography Conference (TCC), Cambridge, MA, USA. Springer
    • D. Micciancio and S. Panjwani. Adaptive security of symbolic encryption. In Proc. 2nd Theory of Cryptography Conference (TCC), volume 3378 of LNCS, pages 169-187, Cambridge, MA, USA, 2005. Springer.
    • (2005) LNCS , vol.3378 , pp. 169-187
    • Micciancio, D.1    Panjwani, S.2
  • 18
    • 0344875571 scopus 로고    scopus 로고
    • Completeness theorems for the Abadi-Rogaway logic of encrypted expressions
    • Preliminary version presented at WITS'02
    • D. Micciancio and B. Warinschi. Completeness theorems for the Abadi-Rogaway logic of encrypted expressions. Journal of Computer Security, 12(1):99-130, 2004. Preliminary version presented at WITS'02.
    • (2004) Journal of Computer Security , vol.12 , Issue.1 , pp. 99-130
    • Micciancio, D.1    Warinschi, B.2
  • 19
    • 35048899313 scopus 로고    scopus 로고
    • Soundness of formal encryption in the presence of active adversaries
    • Proc. 1st Theory of Cryptography Conference (TCC), Cambridge, MA, USA. Springer
    • D. Micciancio and B. Warinschi. Soundness of formal encryption in the presence of active adversaries. In Proc. 1st Theory of Cryptography Conference (TCC), volume 2951 of LNCS, pages 133-151, Cambridge, MA, USA, 2004. Springer.
    • (2004) LNCS , vol.2951 , pp. 133-151
    • Micciancio, D.1    Warinschi, B.2
  • 20
    • 84942255620 scopus 로고    scopus 로고
    • A computational analysis of the Needham-Schroeder protocol
    • Pacific Grove, CA, USA. IEEE Computer Society
    • B. Warinschi. A computational analysis of the Needham-Schroeder protocol. In Proc. 16th IEEE Computer Security Foundations Workshop (CSFW), pages 248-262, Pacific Grove, CA, USA, 2003. IEEE Computer Society.
    • (2003) Proc. 16th IEEE Computer Security Foundations Workshop (CSFW) , pp. 248-262
    • Warinschi, B.1
  • 21
    • 0020301290 scopus 로고
    • Theory and applications of trapdoor functions
    • Chicago, IL, USA. IEEE Computer Society
    • A. C. Yao. Theory and applications of trapdoor functions. In 23rd IEEE Symposium on Foundations of Computer Science (FOCS), pages 80-91, Chicago, IL, USA, 1982. IEEE Computer Society.
    • (1982) 23rd IEEE Symposium on Foundations of Computer Science (FOCS) , pp. 80-91
    • Yao, A.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.