메뉴 건너뛰기




Volumn 394, Issue 1-2, 2008, Pages 112-133

Sound and complete computational interpretation of symbolic hashes in the standard model

Author keywords

Abadi Rogaway logic; Dolev Yao model; Oracle hashing; Protocol verification; Symbolic cryptography

Indexed keywords

COMPUTATIONAL COMPLEXITY; CRYPTOGRAPHY; POLYNOMIALS; SECURITY SYSTEMS; SEMANTICS;

EID: 40049107445     PISSN: 03043975     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.tcs.2007.11.011     Document Type: Article
Times cited : (10)

References (33)
  • 1
    • 33646045378 scopus 로고    scopus 로고
    • Soundness of formal encryption in the presence of key-cycles
    • Proceedings of the 10th European Symposium on Research in Computer Security. De Capitani di Vimercati S., Syverson P.F., and Gollmann D. (Eds). ESORICS'05, Springer Verlag
    • Adão P., Bana G., Herzog J., and Scedrov A. Soundness of formal encryption in the presence of key-cycles. In: De Capitani di Vimercati S., Syverson P.F., and Gollmann D. (Eds). Proceedings of the 10th European Symposium on Research in Computer Security. ESORICS'05. Lecture Notes in Computer Science vol. 3679 (2005), Springer Verlag 374-396
    • (2005) Lecture Notes in Computer Science , vol.3679 , pp. 374-396
    • Adão, P.1    Bana, G.2    Herzog, J.3    Scedrov, A.4
  • 3
    • 33745790245 scopus 로고    scopus 로고
    • Guessing attacks and the computational soundness of static equivalence
    • 9th International Conference on Foundations of Software Science and Computation Structures. Aceto L., and Ingólfsdóttir A. (Eds). FoSSaCS'06, Springer Verlag
    • Abadi M., Baudet M., and Warinschi B. Guessing attacks and the computational soundness of static equivalence. In: Aceto L., and Ingólfsdóttir A. (Eds). 9th International Conference on Foundations of Software Science and Computation Structures. FoSSaCS'06. Lecture Notes in Computer Science vol. 3921 (2006), Springer Verlag 398-412
    • (2006) Lecture Notes in Computer Science , vol.3921 , pp. 398-412
    • Abadi, M.1    Baudet, M.2    Warinschi, B.3
  • 4
    • 84978977131 scopus 로고    scopus 로고
    • Formal eavesdropping and its computational interpretation
    • Proceedings of the 4th International Symposium on Theoretical Aspects of Computer Software. Kobayashi N., and Pierce B.C. (Eds). TACS'01, Springer Verlag
    • Abadi M., and Jürjens J. Formal eavesdropping and its computational interpretation. In: Kobayashi N., and Pierce B.C. (Eds). Proceedings of the 4th International Symposium on Theoretical Aspects of Computer Software. TACS'01. Lecture Notes in Computer Science vol. 2215 (2001), Springer Verlag 82-94
    • (2001) Lecture Notes in Computer Science , vol.2215 , pp. 82-94
    • Abadi, M.1    Jürjens, J.2
  • 5
    • 85083027758 scopus 로고    scopus 로고
    • Reconciling two views of cryptography (the computational soundness of formal encryption)
    • Abadi M., and Rogaway P. Reconciling two views of cryptography (the computational soundness of formal encryption). Journal of Cryptology 15 2 (2002) 103-127
    • (2002) Journal of Cryptology , vol.15 , Issue.2 , pp. 103-127
    • Abadi, M.1    Rogaway, P.2
  • 7
    • 40049087147 scopus 로고    scopus 로고
    • Gergei Bana, Soundness and Completeness of Formal Logics of Symmetric Encryption, Ph.D. Thesis, University of Pennsylvania, 2004
    • Gergei Bana, Soundness and Completeness of Formal Logics of Symmetric Encryption, Ph.D. Thesis, University of Pennsylvania, 2004
  • 8
    • 26444541858 scopus 로고    scopus 로고
    • Computationally sound implementations of equational theories against passive adversaries
    • Proceedings of the 32nd International Colloquium on Automata, Languages and Programming. Caires L., Italiano G.F., Monteiro L., Palamidessi C., and Yung M. (Eds). ICALP'05, Springer Verlag
    • Baudet M., Cortier V., and Kremer S. Computationally sound implementations of equational theories against passive adversaries. In: Caires L., Italiano G.F., Monteiro L., Palamidessi C., and Yung M. (Eds). Proceedings of the 32nd International Colloquium on Automata, Languages and Programming. ICALP'05. Lecture Notes in Computer Science vol. 3580 (2005), Springer Verlag 652-663
    • (2005) Lecture Notes in Computer Science , vol.3580 , pp. 652-663
    • Baudet, M.1    Cortier, V.2    Kremer, S.3
  • 10
    • 38049082991 scopus 로고    scopus 로고
    • A generalization of DDH with applications to protocol analysis and computational soundness
    • Proceedings the IACR International Conference: Advances in Cryptology. Menezes A.J. (Ed). CRYPTO'07, Springer Verlag
    • Bresson E., Lakhnech Y., Mazaré L., and Warinschi B. A generalization of DDH with applications to protocol analysis and computational soundness. In: Menezes A.J. (Ed). Proceedings the IACR International Conference: Advances in Cryptology. CRYPTO'07. Lecture Notes in Computer Science (2007), Springer Verlag
    • (2007) Lecture Notes in Computer Science
    • Bresson, E.1    Lakhnech, Y.2    Mazaré, L.3    Warinschi, B.4
  • 11
    • 33750265393 scopus 로고    scopus 로고
    • Limits of the BRSIM/UC soundness of Dolev-Yao models with hashes
    • Proceedings of the 11th European Symposium on Research in Computer Security. Gollmann D., Meier J., and Sabelfeld A. (Eds). ESORICS'06, Springer Verlag
    • Backes M., Pfitzmann B., and Waidner M. Limits of the BRSIM/UC soundness of Dolev-Yao models with hashes. In: Gollmann D., Meier J., and Sabelfeld A. (Eds). Proceedings of the 11th European Symposium on Research in Computer Security. ESORICS'06. Lecture Notes in Computer Science vol. 4189 (2006), Springer Verlag 404-423
    • (2006) Lecture Notes in Computer Science , vol.4189 , pp. 404-423
    • Backes, M.1    Pfitzmann, B.2    Waidner, M.3
  • 13
    • 84958626314 scopus 로고    scopus 로고
    • Towards realizing random oracles: Hash functions that hide all partial information
    • Advances in Cryptology. Kaliski B. (Ed). CRYPTO'97, Springer Verlag
    • Canetti R. Towards realizing random oracles: Hash functions that hide all partial information. In: Kaliski B. (Ed). Advances in Cryptology. CRYPTO'97. Lecture Notes in Computer Science vol. 1294 (1997), Springer Verlag 455-469
    • (1997) Lecture Notes in Computer Science , vol.1294 , pp. 455-469
    • Canetti, R.1
  • 14
    • 40049093887 scopus 로고    scopus 로고
    • Ran Canetti, Towards realizing random oracles: Hash functions that hide all partial information, Cryptology ePrint Archive, Report 1997/007. http://eprint.iacr.org/1997/007, 1997
    • Ran Canetti, Towards realizing random oracles: Hash functions that hide all partial information, Cryptology ePrint Archive, Report 1997/007. http://eprint.iacr.org/1997/007, 1997
  • 15
    • 4243180376 scopus 로고    scopus 로고
    • The random oracle methodology, revisited
    • Canetti R., Goldreich O., and Halevi S. The random oracle methodology, revisited. Journal of the ACM 51 4 (2004) 557-594
    • (2004) Journal of the ACM , vol.51 , Issue.4 , pp. 557-594
    • Canetti, R.1    Goldreich, O.2    Halevi, S.3
  • 16
    • 84962447835 scopus 로고    scopus 로고
    • Computationally sound symbolic secrecy in the presence of hash functions
    • Proceedings of the 26th Conference on Foundations of Software Technology and Theoretical Computer Science. Garg N., and Arun-Kumar S. (Eds). FSTTCS'06, Springer Verlag
    • Cortier V., Kremer S., Küsters R., and Warinschi B. Computationally sound symbolic secrecy in the presence of hash functions. In: Garg N., and Arun-Kumar S. (Eds). Proceedings of the 26th Conference on Foundations of Software Technology and Theoretical Computer Science. FSTTCS'06. Lecture Notes in Computer Science vol. 4337 (2006), Springer Verlag 176-187
    • (2006) Lecture Notes in Computer Science , vol.4337 , pp. 176-187
    • Cortier, V.1    Kremer, S.2    Küsters, R.3    Warinschi, B.4
  • 20
    • 40049104910 scopus 로고    scopus 로고
    • Shafi Goldwasser, Mihir Bellare, Lecture Notes on Cryptography. http://www-cse.ucsd.edu/~mihir/papers/gb.html, 2001
    • Shafi Goldwasser, Mihir Bellare, Lecture Notes on Cryptography. http://www-cse.ucsd.edu/~mihir/papers/gb.html, 2001
  • 23
    • 33845272534 scopus 로고    scopus 로고
    • Sound computational interpretation of symbolic hashes in the standard model
    • Advances in Information and Computer Security. International Workshop on Security. Yoshiura H., Sakurai K., Rannenberg K., Murayama Y., and Kawamura S. (Eds). IWSEC'06, Springer Verlag
    • Garcia F.D., and van Rossum P. Sound computational interpretation of symbolic hashes in the standard model. In: Yoshiura H., Sakurai K., Rannenberg K., Murayama Y., and Kawamura S. (Eds). Advances in Information and Computer Security. International Workshop on Security. IWSEC'06. Lecture Notes in Computer Science vol. 4266 (2006), Springer Verlag 33-47
    • (2006) Lecture Notes in Computer Science , vol.4266 , pp. 33-47
    • Garcia, F.D.1    van Rossum, P.2
  • 24
    • 18544364489 scopus 로고    scopus 로고
    • A computational interpretation of Dolev-Yao adversaries
    • Herzog J. A computational interpretation of Dolev-Yao adversaries. Theoretical Computer Science 340 1 (2005) 57-81
    • (2005) Theoretical Computer Science , vol.340 , Issue.1 , pp. 57-81
    • Herzog, J.1
  • 25
    • 34347205954 scopus 로고    scopus 로고
    • Computational soundness of symbolic analysis for protocols using hash functions
    • Proceedings of the First Workshop in Information and Computer Security. ICS'06
    • Janvier R., Lakhnech Y., and Mazaré L. Computational soundness of symbolic analysis for protocols using hash functions. Proceedings of the First Workshop in Information and Computer Security. ICS'06. Electronic Notes in Theoretical Computer Science vol. 186 (2007) 121-139
    • (2007) Electronic Notes in Theoretical Computer Science , vol.186 , pp. 121-139
    • Janvier, R.1    Lakhnech, Y.2    Mazaré, L.3
  • 26
    • 38049000874 scopus 로고    scopus 로고
    • Adaptive soundness of static equivalence
    • Proceedings of the 12th European Symposium on Research in Computer Security. Biskup J. (Ed). ESORICS'07, Springer Verlag
    • Kremer S., and Mazaré L. Adaptive soundness of static equivalence. In: Biskup J. (Ed). Proceedings of the 12th European Symposium on Research in Computer Security. ESORICS'07. Lecture Notes in Computer Science vol. 4734 (2007), Springer Verlag 610-625
    • (2007) Lecture Notes in Computer Science , vol.4734 , pp. 610-625
    • Kremer, S.1    Mazaré, L.2
  • 27
    • 40049096796 scopus 로고    scopus 로고
    • Laurent Mazaré, Computationally sound analysis of protocols using bilinear pairings, in: Riccardo Focardi (Eds.) Preliminary Proceedings of the 7th International Workshop on Issues in the Theory of Security, WITS'07, 2007, pp. 6-21
    • Laurent Mazaré, Computationally sound analysis of protocols using bilinear pairings, in: Riccardo Focardi (Eds.) Preliminary Proceedings of the 7th International Workshop on Issues in the Theory of Security, WITS'07, 2007, pp. 6-21
  • 28
    • 24144482305 scopus 로고    scopus 로고
    • Adaptive security of symbolic encryption
    • Proceedings of the 2nd Theory of Cryptography Conference. Kilian J. (Ed). TCC'05, Springer Verlag
    • Micciancio D., and Panjwani S. Adaptive security of symbolic encryption. In: Kilian J. (Ed). Proceedings of the 2nd Theory of Cryptography Conference. TCC'05. Lecture Notes in Computer Science vol. 3378 (2005), Springer Verlag 169-187
    • (2005) Lecture Notes in Computer Science , vol.3378 , pp. 169-187
    • Micciancio, D.1    Panjwani, S.2
  • 29
    • 0344875571 scopus 로고    scopus 로고
    • Completeness theorems of the Abadi-Rogaway logic of encrypted expressions
    • Micciancio D., and Warinschi B. Completeness theorems of the Abadi-Rogaway logic of encrypted expressions. Journal of Computer Security 12 1 (2004) 99-129
    • (2004) Journal of Computer Security , vol.12 , Issue.1 , pp. 99-129
    • Micciancio, D.1    Warinschi, B.2
  • 30
    • 35048899313 scopus 로고    scopus 로고
    • Soundness of formal encryption in the presence of active adversaries
    • Proceedings of the 1st Theory of Cryptography Conference. Naor M. (Ed). TCC'04, Springer Verlag
    • Micciancio D., and Warinschi B. Soundness of formal encryption in the presence of active adversaries. In: Naor M. (Ed). Proceedings of the 1st Theory of Cryptography Conference. TCC'04. Lecture Notes in Computer Science vol. 2951 (2004), Springer Verlag 133-151
    • (2004) Lecture Notes in Computer Science , vol.2951 , pp. 133-151
    • Micciancio, D.1    Warinschi, B.2
  • 31
    • 0034447081 scopus 로고    scopus 로고
    • Birgit Pfitzmann, Michael Waidner, Composition and integrity preservation of secure reactive systems, in: Proceedings of the 7th ACM Conference on Computer and Communication Security, CCS'00, 2000, pp. 245-254
    • Birgit Pfitzmann, Michael Waidner, Composition and integrity preservation of secure reactive systems, in: Proceedings of the 7th ACM Conference on Computer and Communication Security, CCS'00, 2000, pp. 245-254
  • 32
    • 35048855067 scopus 로고    scopus 로고
    • Cryptographic hash-function basics: Definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance
    • Proceedings of the 11th Fast Software Encryption. Roy B., and Meier W. (Eds). FSE'04, Springer Verlag
    • Rogaway P., and Shrimpton T. Cryptographic hash-function basics: Definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance. In: Roy B., and Meier W. (Eds). Proceedings of the 11th Fast Software Encryption. FSE'04. Lecture Notes in Computer Science vol. 3017 (2004), Springer Verlag 371-388
    • (2004) Lecture Notes in Computer Science , vol.3017 , pp. 371-388
    • Rogaway, P.1    Shrimpton, T.2
  • 33
    • 0020301290 scopus 로고    scopus 로고
    • Andrew C. Yao, Theory and applications of trapdoor functions, in: Proceedings of the 23rd Annual Symposium on Foundations of Computer Science, FOCS'82, 1982, pp. 80-91
    • Andrew C. Yao, Theory and applications of trapdoor functions, in: Proceedings of the 23rd Annual Symposium on Foundations of Computer Science, FOCS'82, 1982, pp. 80-91


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.