메뉴 건너뛰기




Volumn 2761, Issue , 2003, Pages 327-349

Composition of cryptographic protocols in a probabilistic polynomial-time process calculus

Author keywords

Composition theorem; Computational security; Cryptographic protocols; Probabilistic process calculus

Indexed keywords

COMPUTATION THEORY; CRYPTOGRAPHY; POLYNOMIAL APPROXIMATION; TURING MACHINES;

EID: 35248861970     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-45187-7_22     Document Type: Article
Times cited : (22)

References (30)
  • 1
    • 0003092378 scopus 로고    scopus 로고
    • A calculus for cryptographic protocols: The spi-calculus
    • M. Abadi and A. Gordon. A calculus for cryptographic protocols: the spi-calculus. Information and Computation, 143:1-70, 1999.
    • (1999) Information and Computation , vol.143 , pp. 1-70
    • Abadi, M.1    Gordon, A.2
  • 2
    • 85083027758 scopus 로고    scopus 로고
    • Reconciling two views of cryptography (The computational soundness of formal encryption)
    • M. Abadi and P. Rogaway. Reconciling two views of cryptography (The computational soundness of formal encryption). Journal of Cryptology, 15(2):103-127, 2002.
    • (2002) Journal of Cryptology , vol.15 , Issue.2 , pp. 103-127
    • Abadi, M.1    Rogaway, P.2
  • 3
    • 84937407919 scopus 로고    scopus 로고
    • Deriving cryptographically sound implementations using composition and formally verified bisimulation
    • Formal Methods Europe, Springer-Verlag
    • M. Backes, C. Jacobi, and B. Pfitzmann. Deriving cryptographically sound implementations using composition and formally verified bisimulation. In Formal Methods Europe, volume 2931 of Lecture Notes in Computer Science, pages 310-329. Springer-Verlag, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2931 , pp. 310-329
    • Backes, M.1    Jacobi, C.2    Pfitzmann, B.3
  • 5
    • 85029542707 scopus 로고
    • Foundations of secure interactive computing
    • Crypto'91, Springer-Verlag
    • D. Beaver. Foundations of secure interactive computing. In Crypto'91, volume 576 of Lecture Notes in Computer Science, pages 377-391. Springer-Verlag, 1991.
    • (1991) Lecture Notes in Computer Science , vol.576 , pp. 377-391
    • Beaver, D.1
  • 6
    • 33746365751 scopus 로고
    • Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority
    • D. Beaver. Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority. Journal of Cryptology, 4:75-122, 1991.
    • (1991) Journal of Cryptology , vol.4 , pp. 75-122
    • Beaver, D.1
  • 7
    • 0035163054 scopus 로고    scopus 로고
    • Universally composable security: A new paradigm for cryptographic protocols
    • IEEE Press, Full paper
    • R. Canetti. Universally composable security: A new paradigm for cryptographic protocols. In 42-nd Annual Symposium on Foundations of Computer Science (FOCS), pages 136-145. IEEE Press, 2001. Full paper available at eprint.iacr.org as 2000/067.
    • (2001) 42-nd Annual Symposium on Foundations of Computer Science (FOCS) , pp. 136-145
    • Canetti, R.1
  • 8
    • 35048860626 scopus 로고    scopus 로고
    • Analysis of key-exchange protocols and their use for building secure channels
    • Eurocrypt'01, Springer-Verlag
    • R. Canetti and H. Krawczyk. Analysis of key-exchange protocols and their use for building secure channels. In Eurocrypt'01, volume 2045 of Lecture Notes in Computer Science, pages 453-474. Springer-Verlag, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2045 , pp. 453-474
    • Canetti, R.1    Krawczyk, H.2
  • 9
    • 0036038991 scopus 로고    scopus 로고
    • Universally composable two-party and multi-party secure computation
    • Full paper
    • R. Canetti, Y. Lindell, R. Ostrovsky, and A. Sahai. Universally composable two-party and multi-party secure computation. In 34-th ACM Symposium on Theory of Computing, pages 484-503, 2002. Full paper available at eprint.iacr.org as 2002/140.
    • (2002) 34-th ACM Symposium on Theory of Computing , pp. 484-503
    • Canetti, R.1    Lindell, Y.2    Ostrovsky, R.3    Sahai, A.4
  • 11
    • 84874800178 scopus 로고
    • A public-key cryptosystem and a signature scheme based on discrete logarithms
    • T. ElGamal. A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, IT-31:469-472, 1985.
    • (1985) IEEE Transactions on Information Theory , vol.IT-31 , pp. 469-472
    • ElGamal, T.1
  • 12
    • 0022080529 scopus 로고
    • A randomized protocol for signing contracts
    • S. Even, O. Goldreich, and A. Lempel. A randomized protocol for signing contracts. Communications of the ACM, 28(6):637-647, 1985.
    • (1985) Communications of the ACM , vol.28 , Issue.6 , pp. 637-647
    • Even, S.1    Goldreich, O.2    Lempel, A.3
  • 15
    • 84955564077 scopus 로고
    • Fair computation of general functions in presence of immoral majority
    • Crypto'90, Springer-Verlag
    • S. Goldwasser and L. Levin. Fair computation of general functions in presence of immoral majority. In Crypto'90, volume 537 of Lecture Notes in Computer Science, pages 77-93. Springer-Verlag, 1990.
    • (1990) Lecture Notes in Computer Science , vol.537 , pp. 77-93
    • Goldwasser, S.1    Levin, L.2
  • 17
    • 84958052989 scopus 로고    scopus 로고
    • Probabilistic polynomial-time equivalence and security analysis
    • Formal Methods in the Development of Computing Systems, Spriger-Verlag
    • P. Lincoln, J. Mitchell, M. Mitchell, and A. Scedrov. Probabilistic polynomial-time equivalence and security analysis. In Formal Methods in the Development of Computing Systems, volume 1708 of Lecture Notes in Computer Science, pages 776-793. Spriger-Verlag, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1708 , pp. 776-793
    • Lincoln, P.1    Mitchell, J.2    Mitchell, M.3    Scedrov, A.4
  • 20
    • 84974655726 scopus 로고
    • Secure computation
    • Crypto'91, Springer-Verlag
    • S. Micali and P. Rogaway. Secure computation. In Crypto'91, volume 576 of Lecture Notes in Computer Science, pages 392-404. Springer-Verlag, 1991.
    • (1991) Lecture Notes in Computer Science , vol.576 , pp. 392-404
    • Micali, S.1    Rogaway, P.2
  • 22
  • 24
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • R. Needham and M. Schroeder. Using encryption for authentication in large networks of computers. Communications of the ACM, 21(12):993-9, 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.1    Schroeder, M.2
  • 28
    • 0029484376 scopus 로고
    • Modelling and verifying key-exchange protocols using CSP and FDR
    • IEEE Computer Society Press
    • A. W. Roscoe. Modelling and verifying key-exchange protocols using CSP and FDR. In 8-th IEEE Computer Security Foundations Workshop (CSFW). IEEE Computer Society Press, 1995.
    • (1995) 8-th IEEE Computer Security Foundations Workshop (CSFW)
    • Roscoe, A.W.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.