메뉴 건너뛰기




Volumn , Issue , 2005, Pages 23-32

Towards computationally sound symbolic analysis of key exchange protocols

Author keywords

Computational soundness; Cryptographic protocols; Protocol logic; Symbolic analysis

Indexed keywords

ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; NETWORK PROTOCOLS; PUBLIC KEY CRYPTOGRAPHY; SECURITY OF DATA;

EID: 31844437459     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1103576.1103580     Document Type: Conference Paper
Times cited : (14)

References (35)
  • 1
    • 85083027758 scopus 로고    scopus 로고
    • Reconciling two views of cryptography (the computational soundness of formal encryption)
    • M. Abadi and P. Rogaway. Reconciling two views of cryptography (the computational soundness of formal encryption). J. Cryptology, 15(2):103-127, 2002.
    • (2002) J. Cryptology , vol.15 , Issue.2 , pp. 103-127
    • Abadi, M.1    Rogaway, P.2
  • 4
    • 35048854169 scopus 로고    scopus 로고
    • A general composition theorem for secure reactive systems
    • Proc. 1st Theory of Cryptography Conference (TCC). Springer-Verlag
    • M. Backes, B. Pfitzmann, and M. Waidner, A general composition theorem for secure reactive systems. In Proc. 1st Theory of Cryptography Conference (TCC), volume 3378 of LNCS, pages 336-354. Springer-Verlag, 2004.
    • (2004) LNCS , vol.3378 , pp. 336-354
    • Backes, M.1    Pfitzmann, B.2    Waidner, M.3
  • 5
    • 33746365751 scopus 로고
    • Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority
    • D. Beaver. Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority. J. Cryptology, 4(2):75-122, 1991.
    • (1991) J. Cryptology , vol.4 , Issue.2 , pp. 75-122
    • Beaver, D.1
  • 7
    • 84945119254 scopus 로고
    • Entity authentication and key distribution
    • Springer-Verlag
    • M. Bellare and P. Rogaway. Entity authentication and key distribution, In Proc. Advances in Cryptology - CRYPTO 1993, volume 773, pages 232-249. Springer-Verlag, 1993.
    • (1993) Proc. Advances in Cryptology - CRYPTO 1993 , vol.773 , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 8
    • 85016462400 scopus 로고
    • Systematic design of two-party authentication protocols
    • Proc. Advances in Cryptology CRYPTO 1991. Springer-Verlag
    • R. Bird, I. Gopal, A. Herzberg, P. Janson, S. Kutton, R. Molva, and M. Yung. Systematic design of two-party authentication protocols. In Proc. Advances in Cryptology CRYPTO 1991, volume 576 of LNCS, pages 44-61. Springer-Verlag, 1991.
    • (1991) LNCS , vol.576 , pp. 44-61
    • Bird, R.1    Gopal, I.2    Herzberg, A.3    Janson, P.4    Kutton, S.5    Molva, R.6    Yung, M.7
  • 11
    • 0000731055 scopus 로고    scopus 로고
    • Security and composition of multiparty cryptographic protocols
    • R. Canetti. Security and composition of multiparty cryptographic protocols. J. Cryptology, 13(1): 143-202, 2000.
    • (2000) J. Cryptology , vol.13 , Issue.1 , pp. 143-202
    • Canetti, R.1
  • 12
    • 0035163054 scopus 로고    scopus 로고
    • Universally composable security: A new paradigm for cryptographic protocols
    • IEEE
    • R. Canetti, Universally composable security: a new paradigm for cryptographic protocols, In Proc. 42nd Annual Symposium on Foundations of Computer Science (FOCS), pages 136-145. IEEE, 2001. Full version at http://eprint.iacr.org/2000/067.
    • (2001) Proc. 42nd Annual Symposium on Foundations of Computer Science (FOCS) , pp. 136-145
    • Canetti, R.1
  • 13
    • 4944266340 scopus 로고    scopus 로고
    • Universally composable signature, certification, and authentication
    • IEEE
    • R. Canetti. Universally composable signature, certification, and authentication. In Proc. 17th IEEE Computer Security Foundations Workshop (CSFW), pages 219-233. IEEE, 2004. Full version at http://eprint.iacr.org/2003/ 329.
    • (2004) Proc. 17th IEEE Computer Security Foundations Workshop (CSFW) , pp. 219-233
    • Canetti, R.1
  • 15
    • 35048860626 scopus 로고    scopus 로고
    • Analysis of key-exchange protocols and their use for building secure channels
    • Proc. Advances in Cryptology - EUROCRYPT 2001. Springer-Verlag
    • R. Canetti and H. Krawczyk. Analysis of key-exchange protocols and their use for building secure channels. In Proc. Advances in Cryptology - EUROCRYPT 2001, volume 2045 of LNCS, pages 453-474. Springer-Verlag, 2001.
    • (2001) LNCS , vol.2045 , pp. 453-474
    • Canetti, R.1    Krawczyk, H.2
  • 16
    • 84947232363 scopus 로고    scopus 로고
    • Universally composable notions of key exchange and secure channels
    • Proc. Advances in Cryptology - EUROCRYPT 2002. Springer-Verlag
    • R. Canetti and H. Krawczyk. Universally composable notions of key exchange and secure channels. In Proc. Advances in Cryptology - EUROCRYPT 2002, volume 2332 of LNCS, pages 337-351. Springer-Verlag, 2002. Full version at http://eprint.iacr.org/2002/059.
    • (2002) LNCS , vol.2332 , pp. 337-351
    • Canetti, R.1    Krawczyk, H.2
  • 17
    • 35248819315 scopus 로고    scopus 로고
    • Universal composition with joint state
    • Proc. Advances in Cryptology - CRYPTO 2003. Springer-Verlag
    • R. Canetti and T. Rabin. Universal composition with joint state. In Proc. Advances in Cryptology - CRYPTO 2003, volume 2729 of LNCS, pages 265-281. Springer-Verlag, 2003.
    • (2003) LNCS , vol.2729 , pp. 265-281
    • Canetti, R.1    Rabin, T.2
  • 18
    • 24644437051 scopus 로고    scopus 로고
    • Computationally sound, automated proofs for security protocols
    • Proc. 14th European Symposium on Programming (ESOP). Springer-Verlag
    • V. Cortier and B. Warinschi. Computationally sound, automated proofs for security protocols, In Proc. 14th European Symposium on Programming (ESOP), volume 3444 of LNCS, pages 157-171. Springer-Verlag, 2005.
    • (2005) LNCS , vol.3444 , pp. 157-171
    • Cortier, V.1    Warinschi, B.2
  • 21
    • 0003286492 scopus 로고    scopus 로고
    • The TLS protocol version 1.0
    • January
    • T. Dierks and C. Allen. The TLS protocol Version 1.0. Internet RFC: http://www.ietf.org/rfc/rfc2246.txt, January 1999.
    • (1999) Internet RFC
    • Dierks, T.1    Allen, C.2
  • 23
    • 0141751776 scopus 로고    scopus 로고
    • A compositional logic for proving security properties of protocols
    • N. Durgin, J.C. Mitchell, and D. Pavlovic. A compositional logic for proving security properties of protocols. J. Computer Security, 11(4):677-722, 2003.
    • (2003) J. Computer Security , vol.11 , Issue.4 , pp. 677-722
    • Durgin, N.1    Mitchell, J.C.2    Pavlovic, D.3
  • 25
    • 0023985465 scopus 로고
    • A digital signature scheme secure against adaptive chosen-message attack
    • S. Goldwasser, S. Micali, and R. Rivest, A digital signature scheme secure against adaptive chosen-message attack. SIAM J. Computing, 17(2):281-308, 1988.
    • (1988) SIAM J. Computing , vol.17 , Issue.2 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.3
  • 28
    • 4944267395 scopus 로고    scopus 로고
    • Internet key exchange (IKEv2) protocol
    • September
    • C. Kaufman (ed.). Internet key exchange (IKEv2) protocol. Internet draff. http://www.ietf.org/internet-drafts/Neumandraft-ietf-ipsec-ikev2-17.txt, September 2004.
    • (2004) Internet Draff
    • Kaufman, C.1
  • 29
    • 0003237987 scopus 로고
    • The Kerberos network authentication service (V5)
    • September
    • J. Kohl and C. Neuman. The Kerberos network authentication service (V5). Internet RFC: http://www.ietf.org/rfc/rfc1510.txt, September 1993.
    • (1993) Internet RFC
    • Kohl, J.1    Neuman, C.2
  • 30
    • 3543052976 scopus 로고    scopus 로고
    • Symmetric encryption in automatic analyses for confidentiality against active adversaries
    • IEEE
    • P. Laud. Symmetric encryption in automatic analyses for confidentiality against active adversaries. In Proc. IEEE Symposium on Security and Privacy, pages 71-85. IEEE, 2004.
    • (2004) Proc. IEEE Symposium on Security and Privacy , pp. 71-85
    • Laud, P.1
  • 31
    • 0344875571 scopus 로고    scopus 로고
    • Completeness theorems for the Abadi-Rogaway language of encrypted expressions
    • D. Micciancio and B. Warinschi. Completeness theorems for the Abadi-Rogaway language of encrypted expressions. J. Computer Security, 12(1):99-130, 2004.
    • (2004) J. Computer Security , vol.12 , Issue.1 , pp. 99-130
    • Micciancio, D.1    Warinschi, B.2
  • 32
    • 35048899313 scopus 로고    scopus 로고
    • Soundness of formal encryption in the presence of active adversaries
    • Proc. 1st Theory of Cryptography Conference (TCC). Springer-Verlag
    • D. Micciancio and B. Warinschi. Soundness of formal encryption in the presence of active adversaries. In Proc. 1st Theory of Cryptography Conference (TCC), volume 3378 of LNCS, pages 133-151. Springer-Verlag, 2004.
    • (2004) LNCS , vol.3378 , pp. 133-151
    • Micciancio, D.1    Warinschi, B.2
  • 33
    • 0034823388 scopus 로고    scopus 로고
    • A model for asynchronous reactive systems and its application to secure message transmission
    • IEEE
    • B. Pfitzmann and M. Waidner, A model for asynchronous reactive systems and its application to secure message transmission. In Proc. IEEE Symposium on Security and Privacy, pages 184-200. IEEE, 2001.
    • (2001) Proc. IEEE Symposium on Security and Privacy , pp. 184-200
    • Pfitzmann, B.1    Waidner, M.2
  • 35
    • 0033344295 scopus 로고    scopus 로고
    • Strand spaces: Proving security protocols correct
    • F. Thayer, J. Herzog, and J. Guttman, Strand spaces: proving security protocols correct. J. Computer Security, 7(1), 1999.
    • (1999) J. Computer Security , vol.7 , Issue.1
    • Thayer, F.1    Herzog, J.2    Guttman, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.