메뉴 건너뛰기




Volumn , Issue , 2007, Pages 112-124

Key-dependent message security under active attacks - BRSIM/UC-soundness of symbolic encryption with key cycles -

Author keywords

[No Author keywords available]

Indexed keywords

DOLEV-YAO MODELS; SYMMETRIC ENCRYPTION;

EID: 35048877673     PISSN: 19401434     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSF.2007.23     Document Type: Conference Paper
Times cited : (24)

References (34)
  • 1
    • 84978977131 scopus 로고    scopus 로고
    • M. Abadi and J. Jürjens. Formal eavesdropping and its computational interpretation. In Proc. 4th International Symposium on Theoretical Aspects of Computer Software TACS, pages 82-94, 2001
    • M. Abadi and J. Jürjens. Formal eavesdropping and its computational interpretation. In Proc. 4th International Symposium on Theoretical Aspects of Computer Software (TACS), pages 82-94, 2001.
  • 2
    • 84879078812 scopus 로고    scopus 로고
    • Reconciling two views of cryptography: The computational soundness of formal encryption
    • Proc. 1st IFIP International Conference on Theoretical Computer Science, of, Springer
    • M. Abadi and P. Rogaway. Reconciling two views of cryptography: The computational soundness of formal encryption. In Proc. 1st IFIP International Conference on Theoretical Computer Science, volume 1872 of Lecture Notes in Computer Science, pages 3-22. Springer, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1872 , pp. 3-22
    • Abadi, M.1    Rogaway, P.2
  • 3
    • 33646045378 scopus 로고    scopus 로고
    • Soundness of formal encryption in the presence of key-cycles
    • Proc. 10th European Symposium on Research in Computer Security ESORICS, of, Springer
    • P. Adão, G. Bana, J. Herzog, and A. Scedrov. Soundness of formal encryption in the presence of key-cycles. In Proc. 10th European Symposium on Research in Computer Security (ESORICS), volume 3679 of Lecture Notes in Computer Science, pages 374-396. Springer, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3679 , pp. 374-396
    • Adão, P.1    Bana, G.2    Herzog, J.3    Scedrov, A.4
  • 6
    • 35048887380 scopus 로고    scopus 로고
    • M. Backes, B. Pfitzmann, and A. Scedrov. Key-dependent message security under active attacks. IACR Cryptology ePrint Archive 2005/421, Nov. 2005.
    • M. Backes, B. Pfitzmann, and A. Scedrov. Key-dependent message security under active attacks. IACR Cryptology ePrint Archive 2005/421, Nov. 2005.
  • 7
    • 1442292329 scopus 로고    scopus 로고
    • M. Backes, B. Pfitzmann, and M. Waidner. A composable cryptographic library with nested operations (extended abstract). In Proc. 10th ACM Conference on Computer and Communications Security, pages 220-230, 2003. Full version in IACR Cryptology ePrint Archive 2003/015, Jan. 2003, http://eprint.iacr.org/.
    • M. Backes, B. Pfitzmann, and M. Waidner. A composable cryptographic library with nested operations (extended abstract). In Proc. 10th ACM Conference on Computer and Communications Security, pages 220-230, 2003. Full version in IACR Cryptology ePrint Archive 2003/015, Jan. 2003, http://eprint.iacr.org/.
  • 8
    • 33746365751 scopus 로고
    • Secure multiparty protocols and zero knowledge proof systems tolerating a faulty minority
    • D. Beaver. Secure multiparty protocols and zero knowledge proof systems tolerating a faulty minority. Journal of Cryptology, 4(2):75-122, 1991.
    • (1991) Journal of Cryptology , vol.4 , Issue.2 , pp. 75-122
    • Beaver, D.1
  • 10
    • 84957629783 scopus 로고    scopus 로고
    • Relations among notions of security for public-key encryption schemes
    • Advances in Cryptology: CRYPTO '98, of, Springer
    • M. Bellare, A. Desai, D. Pointcheval, and P. Rogaway. Relations among notions of security for public-key encryption schemes. In Advances in Cryptology: CRYPTO '98, volume 1462 of Lecture Notes in Computer Science, pages 26-45. Springer, 1998.
    • (1998) Lecture Notes in Computer Science , vol.1462 , pp. 26-45
    • Bellare, M.1    Desai, A.2    Pointcheval, D.3    Rogaway, P.4
  • 11
    • 84937407719 scopus 로고    scopus 로고
    • Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
    • Advances in Cryptology: ASIACRYPT 2000, of, Springer
    • M. Bellare and C. Namprempre. Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. In Advances in Cryptology: ASIACRYPT 2000, volume 1976 of Lecture Notes in Computer Science, pages 531-545. Springer, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1976 , pp. 531-545
    • Bellare, M.1    Namprempre, C.2
  • 13
    • 84945135810 scopus 로고    scopus 로고
    • An efficient system for non-transferable anonymous credentials with optional anonymity revocation
    • Advances in Cryptology: EUROCRYPT 2001, of, Springer
    • J. Camenisch and A. Lysyanskaya. An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In Advances in Cryptology: EUROCRYPT 2001, volume 2045 of Lecture Notes in Computer Science, pages 93-118. Springer, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2045 , pp. 93-118
    • Camenisch, J.1    Lysyanskaya, A.2
  • 14
    • 0000731055 scopus 로고    scopus 로고
    • Security and composition of multiparty cryptographic protocols
    • R. Canetti. Security and composition of multiparty cryptographic protocols. Journal of Cryptology, 3(1):143-202, 2000.
    • (2000) Journal of Cryptology , vol.3 , Issue.1 , pp. 143-202
    • Canetti, R.1
  • 15
    • 0035163054 scopus 로고    scopus 로고
    • R. Canetti. Universally composable security: A new paradigm for cryptographic protocols. In Proc. 42nd IEEE Symposium on Foundations of Computer Science (FOCS), pages 136-145, 2001. Extended version in Cryptology ePrint Archive, Report 2000/67, http://eprint.iacr.org/.
    • R. Canetti. Universally composable security: A new paradigm for cryptographic protocols. In Proc. 42nd IEEE Symposium on Foundations of Computer Science (FOCS), pages 136-145, 2001. Extended version in Cryptology ePrint Archive, Report 2000/67, http://eprint.iacr.org/.
  • 16
    • 33745528593 scopus 로고    scopus 로고
    • Universally composable symbolic analysis of mutual authentication and key exchange protocols
    • Proc. 3rd Theory of Cryptography Conference TCC, of, Springer
    • R. Canetti and J. Herzog. Universally composable symbolic analysis of mutual authentication and key exchange protocols. In Proc. 3rd Theory of Cryptography Conference (TCC), volume 3876 of Lecture Notes in Computer Science, pages 380-403. Springer, 2006.
    • (2006) Lecture Notes in Computer Science , vol.3876 , pp. 380-403
    • Canetti, R.1    Herzog, J.2
  • 21
    • 0023545076 scopus 로고    scopus 로고
    • O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game - or - a completeness theorem for protocols with honest majority. In Proc. 19th Annual ACM Symposium on Theory of Computing (STOC), pages 218-229, 1987.
    • O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game - or - a completeness theorem for protocols with honest majority. In Proc. 19th Annual ACM Symposium on Theory of Computing (STOC), pages 218-229, 1987.
  • 22
    • 84955564077 scopus 로고
    • Fair computation of general functions in presence of immoral majority
    • Advances in Cryptology: CRYPTO '90, of, Springer
    • S. Goldwasser and L. Levin. Fair computation of general functions in presence of immoral majority. In Advances in Cryptology: CRYPTO '90, volume 537 of Lecture Notes in Computer Science, pages 77-93. Springer, 1990.
    • (1990) Lecture Notes in Computer Science , vol.537 , pp. 77-93
    • Goldwasser, S.1    Levin, L.2
  • 24
    • 84945249768 scopus 로고    scopus 로고
    • Semantics and program analysis of computationally secure information flow
    • P. Laud. Semantics and program analysis of computationally secure information flow. In Proc. 10th European Symposium on Programming (ESOP), pages 77-91, 2001.
    • (2001) Proc. 10th European Symposium on Programming (ESOP) , pp. 77-91
    • Laud, P.1
  • 25
    • 3543052976 scopus 로고    scopus 로고
    • P. Laud. Symmetric encryption in automatic analyses for confidentiality against active adversaries. In Proc. 25th IEEE Symposium on Security & Privacy, pages 71-85, 2004.
    • P. Laud. Symmetric encryption in automatic analyses for confidentiality against active adversaries. In Proc. 25th IEEE Symposium on Security & Privacy, pages 71-85, 2004.
  • 27
    • 0024665570 scopus 로고
    • Using narrowing in the analysis of key management protocols
    • C. Meadows. Using narrowing in the analysis of key management protocols. In Proc. 10th IEEE Symposium on Security & Privacy, pages 138-147, 1989.
    • (1989) Proc. 10th IEEE Symposium on Security & Privacy , pp. 138-147
    • Meadows, C.1
  • 28
    • 84974655726 scopus 로고
    • Secure computation
    • Advances in Cryptology: CRYPTO '91, of, Springer
    • S. Micali and P. Rogaway. Secure computation. In Advances in Cryptology: CRYPTO '91, volume 576 of Lecture Notes in Computer Science, pages 392-404. Springer, 1991.
    • (1991) Lecture Notes in Computer Science , vol.576 , pp. 392-404
    • Micali, S.1    Rogaway, P.2
  • 29
    • 35048899313 scopus 로고    scopus 로고
    • Soundness of formal encryption in the presence of active adversaries
    • Proc. 1st Theory of Cryptography Conference TCC, of, Springer
    • D. Micciancio and B. Warinschi. Soundness of formal encryption in the presence of active adversaries. In Proc. 1st Theory of Cryptography Conference (TCC), volume 2951 of Lecture Notes in Computer Science, pages 133-151. Springer, 2004.
    • (2004) Lecture Notes in Computer Science , vol.2951 , pp. 133-151
    • Micciancio, D.1    Warinschi, B.2
  • 30
    • 0034447081 scopus 로고    scopus 로고
    • B. Pfitzmann and M. Waidner. Composition and integrity preservation of secure reactive systems. In Proc. 7th ACM Conference on Computer and Communications Security, pages 245-254, 2000. Extended version (with Matthias Schunter) IBM Research Report RZ 3206, May 2000, http://www.semper.org/ sirene/publ/PfSW1_00ReactSimulIBM.ps.gz.
    • B. Pfitzmann and M. Waidner. Composition and integrity preservation of secure reactive systems. In Proc. 7th ACM Conference on Computer and Communications Security, pages 245-254, 2000. Extended version (with Matthias Schunter) IBM Research Report RZ 3206, May 2000, http://www.semper.org/ sirene/publ/PfSW1_00ReactSimulIBM.ps.gz.
  • 31
    • 0034823388 scopus 로고    scopus 로고
    • B. Pfitzmann and M. Waidner. A model for asynchronous reactive systems and its application to secure message transmission. In Proc. 22nd IEEE Symposium on Security & Privacy, pages 184-200, 2001. Extended version of the model (with Michael Backes) IACR Cryptology ePrint Archive 2004/082, http://eprint.iacr.org/.
    • B. Pfitzmann and M. Waidner. A model for asynchronous reactive systems and its application to secure message transmission. In Proc. 22nd IEEE Symposium on Security & Privacy, pages 184-200, 2001. Extended version of the model (with Michael Backes) IACR Cryptology ePrint Archive 2004/082, http://eprint.iacr.org/.
  • 32
    • 84974554584 scopus 로고
    • Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack
    • Advances in Cryptology: CRYPTO '91, of, Springer
    • C. Rackoff and D. R. Simon. Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack. In Advances in Cryptology: CRYPTO '91, volume 576 of Lecture Notes in Computer Science, pages 433-444. Springer, 1992.
    • (1992) Lecture Notes in Computer Science , vol.576 , pp. 433-444
    • Rackoff, C.1    Simon, D.R.2
  • 33
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • C. E. Shannon. Communication theory of secrecy systems. Bell System Technical Journal, 28(4):656-715, 1949.
    • (1949) Bell System Technical Journal , vol.28 , Issue.4 , pp. 656-715
    • Shannon, C.E.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.