메뉴 건너뛰기




Volumn 4189 LNCS, Issue , 2006, Pages 404-423

Limits of the BRSIM/UC soundness of Dolev-Yao models with hashes

Author keywords

[No Author keywords available]

Indexed keywords

ALGEBRA; MATHEMATICAL MODELS; NETWORK PROTOCOLS; PROBABILISTIC LOGICS; SECURITY SYSTEMS; THEOREM PROVING;

EID: 33750265393     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11863908_25     Document Type: Conference Paper
Times cited : (11)

References (38)
  • 1
    • 84978977131 scopus 로고    scopus 로고
    • Formal eavesdropping and its computational interpretation
    • M. Abadi and J. Jürjens. Formal eavesdropping and its computational interpretation. In Proc. 4th TACS, pages 82-94, 2001.
    • (2001) Proc. 4th TACS , pp. 82-94
    • Abadi, M.1    Jürjens, J.2
  • 2
    • 84879078812 scopus 로고    scopus 로고
    • Reconciling two views of cryptography: The computational soundness of formal encryption
    • Proc. 1st IFIP TCS. Springer
    • M. Abadi and P. Rogaway. Reconciling two views of cryptography: The computational soundness of formal encryption. In Proc. 1st IFIP TCS, volume 1872 of LNCS, pages 3-22. Springer, 2000.
    • (2000) LNCS , vol.1872 , pp. 3-22
    • Abadi, M.1    Rogaway, P.2
  • 3
    • 35048863550 scopus 로고    scopus 로고
    • A cryptographically sound Dolev-Yao style security proof of the Otway-Rees protocol
    • Proc. 9th ESORICS. Springer
    • M. Backes. A cryptographically sound Dolev-Yao style security proof of the Otway-Rees protocol. In Proc. 9th ESORICS, volume 3193 of LNCS, pages 89-108. Springer, 2004.
    • (2004) LNCS , vol.3193 , pp. 89-108
    • Backes, M.1
  • 4
    • 28144458018 scopus 로고    scopus 로고
    • A cryptographically sound Dolev-Yao style security proof of an electronic payment system
    • M. Backes and M. Dürmuth. A cryptographically sound Dolev-Yao style security proof of an electronic payment system. In Proc. I8th IEEE CSFW, pages 78-93, 2005.
    • (2005) Proc. I8th IEEE CSFW , pp. 78-93
    • Backes, M.1    Dürmuth, M.2
  • 5
    • 10844233317 scopus 로고    scopus 로고
    • A cryptographically sound security proof of the Needham-Schroeder-Lowe public-key protocol
    • M. Backes and B. Pfitzmann. A cryptographically sound security proof of the Needham-Schroeder-Lowe public-key protocol. Journal on Selected Areas in Communications, 22(10):2075-2086, 2004.
    • (2004) Journal on Selected Areas in Communications , vol.22 , Issue.10 , pp. 2075-2086
    • Backes, M.1    Pfitzmann, B.2
  • 6
    • 4944234643 scopus 로고    scopus 로고
    • Symmetric encryption in a simulatable Dolev-Yao style cryptographic library
    • M. Backes and B. Pfitzmann. Symmetric encryption in a simulatable Dolev-Yao style cryptographic library. In Proc. I7th IEEE CSFW, pages 204-218, 2004.
    • (2004) Proc. I7th IEEE CSFW , pp. 204-218
    • Backes, M.1    Pfitzmann, B.2
  • 7
    • 33646036428 scopus 로고    scopus 로고
    • Limits of the cryptographic realization of Dolev-Yao-style XOR
    • Proc. 10th ESORICS. Springer
    • M. Backes and B. Pfitzmann. Limits of the cryptographic realization of Dolev-Yao-style XOR. In Proc. 10th ESORICS, volume 3679 of LNCS, pages 178-196. Springer, 2005.
    • (2005) LNCS , vol.3679 , pp. 178-196
    • Backes, M.1    Pfitzmann, B.2
  • 8
    • 1442292329 scopus 로고    scopus 로고
    • A composable cryptographic library with nested operations
    • M. Backes, B. Pfitzmann, and M. Waidner. A composable cryptographic library with nested operations. In Proc. 10th ACM CCS, pages 220-230, 2003.
    • (2003) Proc. 10th ACM CCS , pp. 220-230
    • Backes, M.1    Pfitzmann, B.2    Waidner, M.3
  • 9
    • 0142250274 scopus 로고    scopus 로고
    • Symmetric authentication within a simulatable cryptographic library
    • Proc. 8th ESORICS. Springer
    • M. Backes, B. Pfitzmann, and M. Waidner. Symmetric authentication within a simulatable cryptographic library. In Proc. 8th ESORICS, volume 2808 of LNCS, pages 271-290. Springer, 2003.
    • (2003) LNCS , vol.2808 , pp. 271-290
    • Backes, M.1    Pfitzmann, B.2    Waidner, M.3
  • 12
    • 0027726717 scopus 로고
    • Random oracles are practical: A paradigm for designing efficient protocols
    • M. Bellare and P. Rogaway. Random oracles are practical: A paradigm for designing efficient protocols. In Proc. 1st ACM CCS, pages 62-73, 1993.
    • (1993) Proc. 1st ACM CCS , pp. 62-73
    • Bellare, M.1    Rogaway, P.2
  • 13
    • 0034822279 scopus 로고    scopus 로고
    • An efficient cryptographic protocol verifier based on Prolog rules
    • B. Blanchet. An efficient cryptographic protocol verifier based on Prolog rules. In Proc. 14th IEEE CSFW, pages 82-96, 2001.
    • (2001) Proc. 14th IEEE CSFW , pp. 82-96
    • Blanchet, B.1
  • 14
    • 33751067991 scopus 로고    scopus 로고
    • A computationally sound mechanized prover for security protocols
    • B. Blanchet. A computationally sound mechanized prover for security protocols. In Proc. 27th IEEE Symp. on Security & Privacy, pages 140-154, 2006.
    • (2006) Proc. 27th IEEE Symp. on Security & Privacy , pp. 140-154
    • Blanchet, B.1
  • 15
    • 0842305659 scopus 로고    scopus 로고
    • Towards realizing random oracles: Hash functions that hide all partial information
    • Springer
    • R. Canetti. Towards realizing random oracles: Hash functions that hide all partial information. In Proc. CRYPTO 97, pages 455-469. Springer, 1997.
    • (1997) Proc. CRYPTO 97 , pp. 455-469
    • Canetti, R.1
  • 16
    • 0035163054 scopus 로고    scopus 로고
    • Universally composable security: A new paradigm for cryptographic protocols
    • R. Canetti. Universally composable security: A new paradigm for cryptographic protocols. In Proc. 42nd IEEE FOCS, pages 136-145, 2001.
    • (2001) Proc. 42nd IEEE FOCS , pp. 136-145
    • Canetti, R.1
  • 17
    • 84880897758 scopus 로고    scopus 로고
    • Universally composable commitments
    • Proc. CRYPTO 2001. Springer
    • R. Canetti and M. Fischlin. Universally composable commitments. In Proc. CRYPTO 2001, volume 2139 of LNCS, pages 19-40. Springer, 2001.
    • (2001) LNCS , vol.2139 , pp. 19-40
    • Canetti, R.1    Fischlin, M.2
  • 18
    • 33745528593 scopus 로고    scopus 로고
    • Universally composable symbolic analysis of mutual authentication and key exchange protocols
    • Springer
    • R. Canetti and J. Herzog. Universally composable symbolic analysis of mutual authentication and key exchange protocols. In Proc. 3rd Theory of Cryptography Conf. (TCC), pages 380-403. Springer, 2006.
    • (2006) Proc. 3rd Theory of Cryptography Conf. (TCC) , pp. 380-403
    • Canetti, R.1    Herzog, J.2
  • 19
    • 84947232363 scopus 로고    scopus 로고
    • Universally composable notions of key exchange and secure channels
    • Proc. EUROCRYPT 2002. Springer
    • R. Canetti and H. Krawczyk. Universally composable notions of key exchange and secure channels. In Proc. EUROCRYPT 2002, volume 2332 of LNCS, pages 337-351. Springer, 2002.
    • (2002) LNCS , vol.2332 , pp. 337-351
    • Canetti, R.1    Krawczyk, H.2
  • 22
    • 26444565771 scopus 로고    scopus 로고
    • Probabilistic polynomial-time semantics for a protocol security logic
    • Proc. 32nd Intern. Colloquium on Automata, Languages and Programming (ICALP). Springer
    • A. Datta, A. Derek, J. Mitchell, V. Shmatikov, and M. Turuani. Probabilistic polynomial-time semantics for a protocol security logic. In Proc. 32nd Intern. Colloquium on Automata, Languages and Programming (ICALP), volume 3580 of LNCS, pages 16-29. Springer, 2005.
    • (2005) LNCS , vol.3580 , pp. 16-29
    • Datta, A.1    Derek, A.2    Mitchell, J.3    Shmatikov, V.4    Turuani, M.5
  • 25
    • 35048859832 scopus 로고    scopus 로고
    • Universally composable commitments using random oracles
    • Proc. 1st Theory of Cryptography Conf. (TCC) Springer
    • D. Hofheinz and J. Müller-Quade. Universally composable commitments using random oracles. In Proc. 1st Theory of Cryptography Conf. (TCC), volume 2951 of LNCS, pages 58-76. Springer, 2004.
    • (2004) LNCS , vol.2951 , pp. 58-76
    • Hofheinz, D.1    Müller-Quade, J.2
  • 26
    • 0345412676 scopus 로고    scopus 로고
    • Logics for reasoning about cryptographic constructions
    • R. Impagliazzo and B. M. Kapron. Logics for reasoning about cryptographic constructions. In Proc. 44th IEEE FOCS, pages 372-381, 2003.
    • (2003) Proc. 44th IEEE FOCS , pp. 372-381
    • Impagliazzo, R.1    Kapron, B.M.2
  • 27
    • 84945249768 scopus 로고    scopus 로고
    • Semantics and program analysis of computationally secure information flow
    • P. Laud. Semantics and program analysis of computationally secure information flow. In Proc. 10th European Symp. on Programming (ESOP), pages 77-91, 2001.
    • (2001) Proc. 10th European Symp. on Programming (ESOP) , pp. 77-91
    • Laud, P.1
  • 28
    • 3543052976 scopus 로고    scopus 로고
    • Symmetric encryption in automatic analyses for confidentiality against active adversaries
    • P. Laud. Symmetric encryption in automatic analyses for confidentiality against active adversaries. In Proc. 25th IEEE Symp. on Security & Privacy, pages 71-85, 2004.
    • (2004) Proc. 25th IEEE Symp. on Security & Privacy , pp. 71-85
    • Laud, P.1
  • 29
    • 33745787443 scopus 로고    scopus 로고
    • Secrecy types for a simulatable cryptographic library
    • P. Laud. Secrecy types for a simulatable cryptographic library. In Proc. I2th ACM CCS, pages 26-35, 2005.
    • (2005) Proc. I2th ACM CCS , pp. 26-35
    • Laud, P.1
  • 30
    • 0004256761 scopus 로고
    • PhD thesis, Georgia Institute of Technology
    • M. Merritt. Cryptographic Protocols. PhD thesis, Georgia Institute of Technology, 1983.
    • (1983) Cryptographic Protocols
    • Merritt, M.1
  • 31
    • 35048899313 scopus 로고    scopus 로고
    • Soundness of formal encryption in the presence of active adversaries
    • Proc. 1st Theory of Cryptography Conf. (TCC). Springer
    • D. Micciancio and B. Warinschi. Soundness of formal encryption in the presence of active adversaries. In Proc. 1st Theory of Cryptography Conf. (TCC), volume 2951 of LNCS, pages 133-151. Springer, 2004.
    • (2004) LNCS , vol.2951 , pp. 133-151
    • Micciancio, D.1    Warinschi, B.2
  • 32
    • 0032307051 scopus 로고    scopus 로고
    • A linguistic characterization of bounded oracle computation and probabilistic polynomial time
    • J. Mitchell, M. Mitchell, and A. Scedrov. A linguistic characterization of bounded oracle computation and probabilistic polynomial time. In Proc. 39th FOCS, pages 725-733, 1998.
    • (1998) Proc. 39th FOCS , pp. 725-733
    • Mitchell, J.1    Mitchell, M.2    Scedrov, A.3
  • 33
    • 0345280512 scopus 로고    scopus 로고
    • A probabilistic polynominal-time process calculus for analysis of cryptographic protocols
    • J. Mitchell, M. Mitchell, A. Scedrov, and V. Teague. A probabilistic polynominal-time process calculus for analysis of cryptographic protocols. ENTCS, 47:1-31, 2001.
    • (2001) ENTCS , vol.47 , pp. 1-31
    • Mitchell, J.1    Mitchell, M.2    Scedrov, A.3    Teague, V.4
  • 34
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • L. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Cryptology, 6(1):85-128, 1998.
    • (1998) Journal of Cryptology , vol.6 , Issue.1 , pp. 85-128
    • Paulson, L.1
  • 35
    • 0034447081 scopus 로고    scopus 로고
    • Composition and integrity preservation of secure reactive systems
    • B. Pfitzmann and M. Waidner. Composition and integrity preservation of secure reactive systems. In Proc. 7th ACM CCS, pages 245-254, 2000.
    • (2000) Proc. 7th ACM CCS , pp. 245-254
    • Pfitzmann, B.1    Waidner, M.2
  • 36
    • 0034823388 scopus 로고    scopus 로고
    • A model for asynchronous reactive systems and its application to secure message transmission
    • B. Pfitzmann and M. Waidner. A model for asynchronous reactive systems and its application to secure message transmission. In Proc. 22nd IEEE Symp. on S & P, pages 184-200, 2001.
    • (2001) Proc. 22nd IEEE Symp. on S & P , pp. 184-200
    • Pfitzmann, B.1    Waidner, M.2
  • 38
    • 0020301290 scopus 로고
    • Theory and applications of trapdoor functions
    • A. C. Yao. Theory and applications of trapdoor functions. In Proc. 23rd FOCS, pages 80-91, 1982.
    • (1982) Proc. 23rd FOCS , pp. 80-91
    • Yao, A.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.