메뉴 건너뛰기




Volumn , Issue , 2005, Pages 26-35

Secrecy types for a simulatable cryptographic library

Author keywords

Simulatability; Type systems

Indexed keywords

COMPUTER PROGRAMMING LANGUAGES; COMPUTER SIMULATION; NETWORK PROTOCOLS; SECURITY OF DATA; SEMANTICS;

EID: 33745787443     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1102120.1102126     Document Type: Conference Paper
Times cited : (45)

References (48)
  • 1
    • 0001772130 scopus 로고    scopus 로고
    • Secrecy by typing in security protocols
    • Sept.
    • M. Abadi. Secrecy by Typing in Security Protocols. Journal of the ACM, 46(5):749-786, Sept. 1999.
    • (1999) Journal of the ACM , vol.46 , Issue.5 , pp. 749-786
    • Abadi, M.1
  • 2
    • 0037432692 scopus 로고    scopus 로고
    • Secrecy types for asymmetric communication
    • M. Abadi and B. Blanchet. Secrecy types for asymmetric communication. Theoretical Computer Science, 298(3):387-413, 2003.
    • (2003) Theoretical Computer Science , vol.298 , Issue.3 , pp. 387-413
    • Abadi, M.1    Blanchet, B.2
  • 3
    • 23144463868 scopus 로고    scopus 로고
    • Analyzing security protcols with secrecy types and logic programs
    • Jan.
    • M. Abadi and B. Blanchet. Analyzing Security Protcols with Secrecy Types and Logic Programs. Journal of the ACM, 52(1):102-146, Jan. 2003.
    • (2003) Journal of the ACM , vol.52 , Issue.1 , pp. 102-146
    • Abadi, M.1    Blanchet, B.2
  • 4
    • 0003092378 scopus 로고    scopus 로고
    • A Calculus for cryptographic protocols: The spi calculus
    • Jan.
    • M. Abadi and A. Gordon. A Calculus for Cryptographic Protocols: The Spi Calculus. Information and Computation, 148(1):1-70, Jan. 1999.
    • (1999) Information and Computation , vol.148 , Issue.1 , pp. 1-70
    • Abadi, M.1    Gordon, A.2
  • 5
    • 84978977131 scopus 로고    scopus 로고
    • Formal eavesdropping and its computational interpretation
    • LNCS 2215
    • M. Abadi and J. Jürjens. Formal Eavesdropping and Its Computational Interpretation. In proc. of TACS 2001 (LNCS 2215), pages 82-94.
    • Proc. of TACS 2001 , pp. 82-94
    • Abadi, M.1    Jürjens, J.2
  • 6
    • 84879078812 scopus 로고    scopus 로고
    • Reconciling two views of cryptography (The computational soundness of formal encryption)
    • LNCS 1872
    • M. Abadi and P. Rogaway. Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption). In proc. of International Conference IFIP TCS 2000 (LNCS 1872) pages 3-22.
    • Proc. of International Conference IFIP TCS 2000 , pp. 3-22
    • Abadi, M.1    Rogaway, P.2
  • 7
    • 35048863550 scopus 로고    scopus 로고
    • A cryptographically sound Dolev-yao style security proof of the Otway-rees protocol
    • LNCS 3193
    • M. Backes. A Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees Protocol. In proc. of ESORICS 2004 (LNCS 3193) pages 89-108.
    • Proc. of ESORICS 2004 , pp. 89-108
    • Backes, M.1
  • 8
    • 35248896750 scopus 로고    scopus 로고
    • A cryptographically sound security proof of the needham-schroeder-lowe public-key protocol
    • LNCS 2914
    • M. Backes and B. Pfitzmann, A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol. In proc. of FST TCS 2003 (LNCS 2914), pages 1-12.
    • Proc. of FST TCS 2003 , pp. 1-12
    • Backes, M.1    Pfitzmann, B.2
  • 9
    • 4944234643 scopus 로고    scopus 로고
    • Symmetric encryption in a simulatable Dolev-yao style cryptographic library
    • M. Backes and B. Pfitzmann. Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library. In proc. of IEEE CSFW 2004, pages 204-218.
    • Proc. of IEEE CSFW 2004 , pp. 204-218
    • Backes, M.1    Pfitzmann, B.2
  • 10
    • 24344472288 scopus 로고    scopus 로고
    • Relating symbolic and cryptographic secrecy
    • M. Backes and B. Pfitzmann. Relating Symbolic and Cryptographic Secrecy. In proc. of IEEE S&P 2005.
    • (2005) Proc. of IEEE S&P
    • Backes, M.1    Pfitzmann, B.2
  • 11
    • 0142250274 scopus 로고    scopus 로고
    • Symmetric authentication within a simulatable cryptographic library
    • LNCS 2808
    • M. Backes, B. Pfitzmann, and M. Waidner. Symmetric authentication within a simulatable cryptographic library. In proc. of ESORICS 2003 (LNCS 2808), pages 271-290.
    • Proc. of ESORICS 2003 , pp. 271-290
    • Backes, M.1    Pfitzmann, B.2    Waidner, M.3
  • 14
    • 84957629783 scopus 로고    scopus 로고
    • Relations among notions of security for public-key encryption schemes
    • LNCS 1462
    • M. Bellare, A. Desai, D. Pointcheval, and P. Rogaway, Relations among Notions of Security for Public-Key Encryption Schemes. In proc of. CRYPTO '98 (LNCS 1462), pages 26-43.
    • Proc Of. CRYPTO '98 , pp. 26-43
    • Bellare, M.1    Desai, A.2    Pointcheval, D.3    Rogaway, P.4
  • 15
    • 3543058869 scopus 로고    scopus 로고
    • Automatic proof of strong secrecy for security protocols
    • B. Blanchet. Automatic Proof of Strong Secrecy for Security Protocols. In proc. of IEEE S&P 2004, pages 86-100.
    • Proc. of IEEE S&P 2004 , pp. 86-100
    • Blanchet, B.1
  • 16
    • 0035163054 scopus 로고    scopus 로고
    • Universally composable security: A new paradigm for cryptographic protocols
    • R. Canetti. Universally Composable Security: A New Paradigm for Cryptographic Protocols. In proc. of FOCS 2001, pages 136-145.
    • Proc. of FOCS 2001 , pp. 136-145
    • Canetti, R.1
  • 17
    • 84880897758 scopus 로고    scopus 로고
    • Universally composable commitments
    • LNCS 2139
    • R. Canetti and M. Fischlin. Universally Composable Commitments. In proc. of CRYPTO 2001 (LNCS 2139), pages 19-40.
    • Proc. of CRYPTO 2001 , pp. 19-40
    • Canetti, R.1    Fischlin, M.2
  • 18
    • 24344464253 scopus 로고    scopus 로고
    • Universally composable symbolic analysis of cryptographic protocols (The case of encryption-based mutual authentication and key exchange)
    • 22 Feb.
    • R. Canetti and J. Herzog. Universally Composable Symbolic Analysis of Cryptographic Protocols (The case of encryption-based mutual authentication and key exchange). Cryptology ePrint Archive: Report 2004/334, 22 Feb. 2005.
    • (2005) Cryptology EPrint Archive: Report , vol.2004 , Issue.334
    • Canetti, R.1    Herzog, J.2
  • 19
    • 84947232363 scopus 로고    scopus 로고
    • Universally composable notions of key exchange and secure channels
    • LNCS 2332
    • R. Canetti and H. Krawczyk, Universally Composable Notions of Key Exchange and Secure Channels. In proc. of EUROCRYPT 2002 (LNCS 2332), pages 337-331.
    • Proc. of EUROCRYPT 2002 , pp. 337-1331
    • Canetti, R.1    Krawczyk, H.2
  • 20
    • 0036038991 scopus 로고    scopus 로고
    • Universally composable two-party and multi-party secure computation
    • R. Canetti, Y. Lindell, R. Ostrovsky, and A. Sahai. Universally composable two-party and multi-party secure computation. In proc. of STOC 2002, pages 494-303.
    • Proc. of STOC 2002 , pp. 494-1303
    • Canetti, R.1    Lindell, Y.2    Ostrovsky, R.3    Sahai, A.4
  • 21
    • 24644437051 scopus 로고    scopus 로고
    • Computationally sound, automated proofs for security protocols
    • LNCS 3444
    • V. Cottier and B. Warinschi. Computationally Sound, Automated Proofs for Security Protocols. In proc. of ESOP 2005 (LNCS 3444), pages 157-171.
    • Proc. of ESOP 2005 , pp. 157-171
    • Cottier, V.1    Warinschi, B.2
  • 22
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • Mar.
    • D. Dolev and A. Yao. On the security of public key protocols, IEEE Transactions on Information Theory, IT-29(12):198-208, Mar. 1983.
    • (1983) IEEE Transactions on Information Theory , vol.IT-29 , Issue.12 , pp. 198-208
    • Dolev, D.1    Yao, A.2
  • 25
    • 0141863341 scopus 로고    scopus 로고
    • Authenticity by typing for security protocols
    • A. D. Gordon and A. Jeffrey. Authenticity by Typing for Security Protocols. Journal of Computer Security, 11(4):431-520, 2003.
    • (2003) Journal of Computer Security , vol.11 , Issue.4 , pp. 431-520
    • Gordon, A.D.1    Jeffrey, A.2
  • 26
    • 0038414953 scopus 로고    scopus 로고
    • Typing correspondence assertions for communication protocols
    • A. D. Gordon and A. Jeffrey, Typing correspondence assertions for communication protocols. Theoretical Computer Science, 300(1-3):379-409.
    • Theoretical Computer Science , vol.300 , Issue.1-3 , pp. 379-409
    • Gordon, A.D.1    Jeffrey, A.2
  • 27
    • 3042660681 scopus 로고    scopus 로고
    • Types and effects for asymmetric cryptographic protocols
    • A. D. Gordon and A. Jeffrey. Types and effects for asymmetric cryptographic protocols. Journal of Computer Security, 12(3-4):435-483, 2004.
    • (2004) Journal of Computer Security , vol.12 , Issue.3-4 , pp. 435-483
    • Gordon, A.D.1    Jeffrey, A.2
  • 28
    • 0035750923 scopus 로고    scopus 로고
    • The faithfulness of abstract protocol analysis: Message authentication
    • J. Guttman, F. Thayer, and L. Zuck. The faithfulness of abstract protocol analysis: message authentication. In proc. of ACM CCS 2001, pages 186-195.
    • Proc. of ACM CCS 2001 , pp. 186-195
    • Guttman, J.1    Thayer, F.2    Zuck, L.3
  • 29
    • 35248848005 scopus 로고    scopus 로고
    • Plaintext awareness via key registration
    • LNCS 2729
    • J. Herzog, M. Liskov, and S. Micali. Plaintext Awareness via Key Registration. In proc. of CRYPTO 2003 (LNCS 2729), pages 548-564.
    • Proc. of CRYPTO 2003 , pp. 548-564
    • Herzog, J.1    Liskov, M.2    Micali, S.3
  • 30
    • 24644476184 scopus 로고    scopus 로고
    • Completing the picture: Soundness of formal encryption in the presence of active adversaries
    • LNCS 3444
    • R. Janvier, Y. Lakhnech, and L. Mazaré. Completing the Picture: Soundness of Formal Encryption in the Presence of Active Adversaries. In proc. of ESOP 2003 (LNCS 3444), pages 172-185.
    • Proc. of ESOP 2003 , pp. 172-185
    • Janvier, R.1    Lakhnech, Y.2    Mazaré, L.3
  • 31
    • 33745776339 scopus 로고    scopus 로고
    • Compositions of cryptographic schemes and their applications to protocols
    • 1 Feb.
    • R. Janvier, Y. Lakhnech, and L. Mazaré (De)Compositions of Cryptographic Schemes and their Applications to Protocols. Cryptology ePrint Archive, Report 2005/020, 1 Feb. 2005.
    • (2005) Cryptology EPrint Archive, Report , vol.2005 , Issue.20
    • Janvier, R.1    Lakhnech, Y.2    Mazaré, L.3
  • 32
    • 35248840989 scopus 로고    scopus 로고
    • Handling encryption in analyses for secure information flow
    • LNCS 2618
    • P. Laud. Handling Encryption in Analyses for Secure Information Flow. In proc. of ESOP 2003 (LNCS 2618), pages 159-173.
    • Proc. of ESOP 2003 , pp. 159-173
    • Laud, P.1
  • 33
    • 3543052976 scopus 로고    scopus 로고
    • Symmetric encryption in automatic analyses for confidentiality against active adversaries
    • P. Laud. Symmetric encryption in automatic analyses for confidentiality against active adversaries. In proc. of IEEE S&P 2004, pages 71-85.
    • Proc. of IEEE S&P 2004 , pp. 71-85
    • Laud, P.1
  • 34
    • 33745777236 scopus 로고    scopus 로고
    • Secrecy types for a simulatable cryptographic library
    • Cybernetica, Aug.
    • P. Laud. Secrecy Types for a Simulatable Cryptographic Library. Research Report IT-LU-O-162-050823, Cybernetica, Aug. 2005.
    • (2005) Research Report , vol.IT-LU-O-162-050823
    • Laud, P.1
  • 35
    • 26844509701 scopus 로고    scopus 로고
    • A type system for computationally secure information flow
    • LNCS 3623
    • P. Laud and V. Vene. A Type System for Computationally Secure Information Flow. In proc. of FCT 2005 (LNCS 3623), pages 365-377.
    • Proc. of FCT 2005 , pp. 365-377
    • Laud, P.1    Vene, V.2
  • 37
    • 84958052989 scopus 로고    scopus 로고
    • Probabilistic polynomial-time equivalence and security analysis
    • LNCS 1708
    • P. Lincoln, J. Mitchell, M. Mitchell, and A. Scedrov. Probabilistic Polynomial-Time Equivalence and Security Analysis. In proc. of FM '99 (LNCS 1708), pages 776-793.
    • Proc. of FM '99 , pp. 776-793
    • Lincoln, P.1    Mitchell, J.2    Mitchell, M.3    Scedrov, A.4
  • 38
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the needham-schroeder public-key protocol using FDR
    • LNCS 1055
    • G. Lowe. Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR. In proc. of TACAS '96 (LNCS 1055), pages 147-166.
    • Proc. of TACAS '96 , pp. 147-166
    • Lowe, G.1
  • 39
    • 0037250964 scopus 로고    scopus 로고
    • Formal methods for cryptographic protocol analysis: Emerging issues and trends
    • Jan.
    • C. Meadows. Formal Methods for Cryptographic Protocol Analysis: Emerging Issues and Trends. IEEE Journal on Selected Areas in Communication, 21(1):44-54, Jan. 2003.
    • (2003) IEEE Journal on Selected Areas in Communication , vol.21 , Issue.1 , pp. 44-54
    • Meadows, C.1
  • 40
    • 24144482305 scopus 로고    scopus 로고
    • Adaptive security of symbolic encryption
    • (LNCS 3378)
    • D. Micciancio and S. Panjwani. Adaptive Security of Symbolic Encryption. In proc. of TCC 2005 (LNCS 3378), pages 169-187.
    • Proc. of TCC 2005 , pp. 169-187
    • Micciancio, D.1    Panjwani, S.2
  • 42
    • 35048899313 scopus 로고    scopus 로고
    • Soundness of formal encryption in the presence of active adversaries
    • LNCS 2951
    • D. Micciancio and B. Warinschi. Soundness of Formal Encryption in the Presence of Active Adversaries. In proc. TCC 2004 (LNCS 2951), pages 133-151.
    • Proc. TCC 2004 , pp. 133-151
    • Micciancio, D.1    Warinschi, B.2
  • 43
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • Dec.
    • R. M. Needham and M. D. Schroeder. Using Encryption for Authentication in Large Networks of Computers. Communications of the ACM, 21(12):993-999, Dec. 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 44
    • 0034823388 scopus 로고    scopus 로고
    • A model for asynchronous reactive systems and its application to secure message transmission
    • B. Pfitzmann and M. Waidner. A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission. In IEEE S&P 2001, pages 184-200.
    • IEEE S&P 2001 , pp. 184-200
    • Pfitzmann, B.1    Waidner, M.2
  • 45
    • 84974554584 scopus 로고    scopus 로고
    • Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack
    • LNCS 576
    • C. Rackoff and D. R. Simon. Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack. In proc. of CRYPTO '91 (LNCS 576), pages 433-444.
    • Proc. of CRYPTO '91 , pp. 433-444
    • Rackoff, C.1    Simon, D.R.2
  • 46
    • 35048876713 scopus 로고    scopus 로고
    • Probabilistic bisimulation and equivalence for security analysis of network protocols
    • LNCS 2987
    • A. Ramanathan, J. C. Mitchell, A. Scedrov, and V. Teague. Probabilistic Bisimulation and Equivalence for Security Analysis of Network Protocols. In proc. of FOSSACS 2004 (LNCS 2987), pages 468-483.
    • Proc. of FOSSACS 2004 , pp. 468-483
    • Ramanathan, A.1    Mitchell, J.C.2    Scedrov, A.3    Teague, V.4
  • 47
    • 0020301290 scopus 로고    scopus 로고
    • Theory and applications of trapdoor functions (extended abstract)
    • A. Yao. Theory and applications of trapdoor functions (extended abstract). In proc. of FOCS '82, pages 80-91.
    • Proc. of FOCS '82 , pp. 80-91
    • Yao, A.1
  • 48
    • 35048850444 scopus 로고    scopus 로고
    • A note on the perfect encryption assumption in a process calculus
    • LNCS 2987
    • R. Zunino and P. Degano. A Note on the Perfect Encryption Assumption in a Process Calculus. In proc. of FOSSACS 2004 (LNCS 2987), pages 514-528.
    • Proc. of FOSSACS 2004 , pp. 514-528
    • Zunino, R.1    Degano, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.