메뉴 건너뛰기




Volumn 4948 LNCS, Issue , 2008, Pages 125-141

The layered games framework for specifications and analysis of security protocols

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; GAME THEORY; MICROFLUIDICS; NETWORK PROTOCOLS; SPECIFICATIONS;

EID: 40249116752     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-78524-8_8     Document Type: Conference Paper
Times cited : (2)

References (35)
  • 1
    • 85083027758 scopus 로고    scopus 로고
    • Reconciling two views of cryptography (the computational soundness of formal encryption). JCRYPTOL
    • Abadi, Rogaway: Reconciling two views of cryptography (the computational soundness of formal encryption). JCRYPTOL: Journal of Cryptology 15 (2002)
    • (2002) Journal of Cryptology , vol.15
    • Abadi, R.1
  • 3
    • 40249087764 scopus 로고    scopus 로고
    • Turuani: Compositional analysis of contract-signing protocols. TCS
    • Backes, Datta, Derek, Mitchell, Turuani: Compositional analysis of contract-signing protocols. TCS: Theoretical Computer Science 367 (2006)
    • (2006) Theoretical Computer Science , vol.367
    • Backes, D.1    Derek, M.2
  • 4
    • 33750251326 scopus 로고    scopus 로고
    • Conditional Reactive Simulatability
    • Gollmann, D, Meier, J, Sabelfeld, A, eds, ESORICS 2006, Springer, Heidelberg
    • Backes, M., Dürmuth, M., Hofheinz, D., Küsters, R.: Conditional Reactive Simulatability. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. LNCS, vol. 4189, pp. 424-443. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4189 , pp. 424-443
    • Backes, M.1    Dürmuth, M.2    Hofheinz, D.3    Küsters, R.4
  • 5
    • 35048854169 scopus 로고    scopus 로고
    • Backes, M., Pfitzmann, B., Waidner, M.: A General Composition Theorem for Secure Reactive Systems. In: Naor, M. (ed.) TCC 2004. LNCS, 2951, pp. 336 354. Springer, Heidelberg (2004)
    • Backes, M., Pfitzmann, B., Waidner, M.: A General Composition Theorem for Secure Reactive Systems. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 336 354. Springer, Heidelberg (2004)
  • 6
    • 40249085236 scopus 로고    scopus 로고
    • Backes, M., Pfitzmann, B., Waidner, M.: Secure Asynchronous Reactive Systems. Cryptology ePrint Archive, Report, 2004/082 (2004), http://eprint.iacr.org/
    • Backes, M., Pfitzmann, B., Waidner, M.: Secure Asynchronous Reactive Systems. Cryptology ePrint Archive, Report, 2004/082 (2004), http://eprint.iacr.org/
  • 8
    • 33746041431 scopus 로고    scopus 로고
    • The security of triple encryption and a framework for code-based game-playing proofs
    • Vaudenay, S, ed, EUROCRYPT 2006, Springer, Heidelberg
    • Bellare, M., Rogaway, P.: The security of triple encryption and a framework for code-based game-playing proofs. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 3-540." Springer, Heidelberg (2006), http://dx.doi.org/10.1007/11761679_25
    • (2006) LNCS , vol.4004 , pp. 3-540
    • Bellare, M.1    Rogaway, P.2
  • 11
    • 32844458303 scopus 로고    scopus 로고
    • Lindell: On the limitations of universally composable two-party computation without set-up assumptions
    • 19th edn
    • Canetti, Kushilevitz, Lindell: On the limitations of universally composable two-party computation without set-up assumptions. In: JCRYPTOL: Journal of Cryptology, 19th edn. (2006)
    • (2006) JCRYPTOL: Journal of Cryptology
    • Canetti, K.1
  • 12
    • 0000731055 scopus 로고    scopus 로고
    • Security and Composition of Multiparty Cryptographic Protocols
    • Canetti, R.: Security and Composition of Multiparty Cryptographic Protocols. Journal of Cryptology 13(1), 143-202 (2000)
    • (2000) Journal of Cryptology , vol.13 , Issue.1 , pp. 143-202
    • Canetti, R.1
  • 13
    • 84880897758 scopus 로고    scopus 로고
    • Universally Composable Commitments
    • Kilian, J, ed, CRYPTO 2001, Springer, Heidelberg
    • Canetti, R., Fischlin, M.: Universally Composable Commitments. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 19 40. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2139 , pp. 19-40
    • Canetti, R.1    Fischlin, M.2
  • 14
    • 0035163054 scopus 로고    scopus 로고
    • Canetti, R.: Universally Composable Security: A. New Paradigm for Cryptographic Protocols. In: IEEE Symposium on Foundations of Computer Science, pp. 136-145 (2001) updated version: Cryptology ePrint Archive, Report 2000/067
    • Canetti, R.: Universally Composable Security: A. New Paradigm for Cryptographic Protocols. In: IEEE Symposium on Foundations of Computer Science, pp. 136-145 (2001) updated version: Cryptology ePrint Archive, Report 2000/067
  • 15
    • 40249085237 scopus 로고    scopus 로고
    • Canetti, R., Cheung, L., Kaynar, D.K., Liskov, M., Lynch, N.A., Pereira, O., Segala, R.: Time-bounded task-PIOAs: A framework for analyzing security protocols. In: Dolev, S. (ed.) DISC 2006. LNCS, 41.67, pp. 3-540. Springer, Heidelberg (2006), http://dx.doi.org/10.1007/11864219.17
    • Canetti, R., Cheung, L., Kaynar, D.K., Liskov, M., Lynch, N.A., Pereira, O., Segala, R.: Time-bounded task-PIOAs: A framework for analyzing security protocols. In: Dolev, S. (ed.) DISC 2006. LNCS, vol. 41.67, pp. 3-540. Springer, Heidelberg (2006), http://dx.doi.org/10.1007/11864219.17
  • 16
    • 24144442872 scopus 로고    scopus 로고
    • A derivation system and compositional logic for security protocols
    • Datta, A., Derek, A., Mitchell, J.C., Pavlovic, D.: A derivation system and compositional logic for security protocols. J. Comput. Secur. 13(3), 423-482 (2005)
    • (2005) J. Comput. Secur , vol.13 , Issue.3 , pp. 423-482
    • Datta, A.1    Derek, A.2    Mitchell, J.C.3    Pavlovic, D.4
  • 17
    • 33745534937 scopus 로고    scopus 로고
    • Datta, A., Derek, A., Mitchell, J.C., Ramanathan, A., Scedrov, A.: Games and the impossibility of realizable ideal functionality. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, 3876, pp. 360-379. Springer, Heidelberg (2006)
    • Datta, A., Derek, A., Mitchell, J.C., Ramanathan, A., Scedrov, A.: Games and the impossibility of realizable ideal functionality. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 360-379. Springer, Heidelberg (2006)
  • 19
    • 0022793132 scopus 로고
    • Micali: How to construct random functions. JACM
    • Goldreich, Goldwasser, Micali: How to construct random functions. JACM: Journal of the ACM 33 (1986)
    • (1986) Journal of the ACM , vol.33
    • Goldreich, G.1
  • 20
    • 33645593031 scopus 로고    scopus 로고
    • Foundations of Cryptography
    • Cambridge University Press, New York
    • Goldreich, O.: Foundations of Cryptography. Basic Applications, vol. 2. Cambridge University Press, New York (2004)
    • (2004) Basic Applications , vol.2
    • Goldreich, O.1
  • 21
    • 0023545076 scopus 로고    scopus 로고
    • Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game or A completeness theorem for protocols with honest majority. In: STOC, pp. 218-229. ACM, New York (1987)
    • Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game or A completeness theorem for protocols with honest majority. In: STOC, pp. 218-229. ACM, New York (1987)
  • 22
    • 85050160774 scopus 로고    scopus 로고
    • Goldwasser, S., Micali, S.: Probabilistic encryption & how to play mental poker keeping secret all partial information. In: STOC 1982: Proceedings of the fourteenth annual ACM symposium on Theory of computing, pp. 365-377. ACM Press, New York, USA (1982)
    • Goldwasser, S., Micali, S.: Probabilistic encryption & how to play mental poker keeping secret all partial information. In: STOC 1982: Proceedings of the fourteenth annual ACM symposium on Theory of computing, pp. 365-377. ACM Press, New York, USA (1982)
  • 24
    • 40249101341 scopus 로고    scopus 로고
    • Halevi, S.: A. plausible approach to computer-aided cryptographic proofs. Report, 2005/181, Cryptology ePrint Archive (June 2005), http ://eprint.iacr.org/2005/181.pdf
    • Halevi, S.: A. plausible approach to computer-aided cryptographic proofs. Report, 2005/181, Cryptology ePrint Archive (June 2005), http ://eprint.iacr.org/2005/181.pdf
  • 26
    • 33750026446 scopus 로고    scopus 로고
    • Herzberg, A., Yoffe, I.: On Secure Orders in the Presence of Faults. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, 4116, pp. 126-140. Springer, Heidelberg (2006) New version: Foundations of Secure E-Commerce: The Order Layer, in Cryptology ePrint Archive, Report 2006/352.
    • Herzberg, A., Yoffe, I.: On Secure Orders in the Presence of Faults. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, vol. 4116, pp. 126-140. Springer, Heidelberg (2006) New version: Foundations of Secure E-Commerce: The Order Layer, in Cryptology ePrint Archive, Report 2006/352.
  • 27
    • 40249097041 scopus 로고    scopus 로고
    • The delivery and evidences layer. Cryptology ePrint Archive
    • Report 2007/139
    • Herzberg, A., Yoffe, I.: The delivery and evidences layer. Cryptology ePrint Archive, Report 2007/139 (2007), http://eprint.iacr.org/
    • (2007)
    • Herzberg, A.1    Yoffe, I.2
  • 28
    • 40249090930 scopus 로고    scopus 로고
    • Layered specifications, design and analysis of security protocols. Cryptology ePrint Archive
    • Report 2006/398
    • Herzberg, A., Yoffe, I.: Layered specifications, design and analysis of security protocols. Cryptology ePrint Archive, Report 2006/398 (2006)
    • (2006)
    • Herzberg, A.1    Yoffe, I.2
  • 31
    • 33947621658 scopus 로고    scopus 로고
    • Simulation-Based Security with Inexhaustible Interactive Turing Machines
    • Washington, DC, USA, pp, IEEE Computer Society Press, Los Alamitos
    • Küsters, R.: Simulation-Based Security with Inexhaustible Interactive Turing Machines. In: CSFW 2006: Proceedings of the 19th IEEE Workshop on Computer Security Foundations, Washington, DC, USA, pp. 309-320. IEEE Computer Society Press, Los Alamitos (2006)
    • (2006) CSFW 2006: Proceedings of the 19th IEEE Workshop on Computer Security Foundations , pp. 309-320
    • Küsters, R.1
  • 32
    • 0032218226 scopus 로고    scopus 로고
    • Lincoln, P., Mitchell, J., Mitchell, M., Scedrov, A.: A. probabilistic poly-time framework for protocol analysis. In: CCS 1998: Proceedings of the 5th ACM conference on Computer and communications security, pp. 112-121. ACM Press, New York (1998)
    • Lincoln, P., Mitchell, J., Mitchell, M., Scedrov, A.: A. probabilistic poly-time framework for protocol analysis. In: CCS 1998: Proceedings of the 5th ACM conference on Computer and communications security, pp. 112-121. ACM Press, New York (1998)
  • 35
    • 0034823388 scopus 로고    scopus 로고
    • A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission
    • Washington, DC, USA, pp, IEEE Computer Society Press, Los Alamitos
    • Pfitzmann, B., Waidner, M.: A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission. In: SP 2001: Proceedings of the 2001 IEEE Symposium on Security and Privacy, Washington, DC, USA, pp. 184-200. IEEE Computer Society Press, Los Alamitos (2001)
    • (2001) SP 2001: Proceedings of the 2001 IEEE Symposium on Security and Privacy , pp. 184-200
    • Pfitzmann, B.1    Waidner, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.