메뉴 건너뛰기




Volumn 4912 LNCS, Issue , 2008, Pages 312-329

Formal proofs of cryptographic security of Diffie-Hellman-based protocols

Author keywords

[No Author keywords available]

Indexed keywords

MANAGEMENT PROTOCOL; PROTOCOL STANDARDS;

EID: 41549086014     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-78663-4_21     Document Type: Conference Paper
Times cited : (17)

References (43)
  • 1
    • 85083027758 scopus 로고    scopus 로고
    • Abadi, M., R.ogaway, P.: Reconciling two views of cryptography (the computational soundness of formal encryption). Journal of Cryptology 15(2), 103-127 (2002)
    • Abadi, M., R.ogaway, P.: Reconciling two views of cryptography (the computational soundness of formal encryption). Journal of Cryptology 15(2), 103-127 (2002)
  • 6
    • 27544482135 scopus 로고    scopus 로고
    • Relating symbolic and cryptographic secrecy
    • IEEE Computer Society Press, Los Alamitos
    • Backes, M., Pfitzmann, B.: Relating symbolic and cryptographic secrecy. In: Proc. IEEE Symposium on Security and Privacy, pp. 171-182. IEEE Computer Society Press, Los Alamitos (2005)
    • (2005) Proc. IEEE Symposium on Security and Privacy , pp. 171-182
    • Backes, M.1    Pfitzmann, B.2
  • 7
    • 32844458560 scopus 로고    scopus 로고
    • A universally composable cryptographic library. Cryptology ePrint Archive
    • Report 2003/015
    • Backes, M., Pfitzmann, B., Waidner, M.: A universally composable cryptographic library. Cryptology ePrint Archive, Report 2003/015 (2003)
    • (2003)
    • Backes, M.1    Pfitzmann, B.2    Waidner, M.3
  • 8
    • 33750265393 scopus 로고    scopus 로고
    • Limits of the reactive simulatability/UC of Dolev-Yao models with hashes
    • Gollmann, D, Meier, J, Sabelfeld, A, eds, ESORICS 2006, Springer, Heidelberg
    • Backes, M., Pfitzmann, B., Waidner, M.: Limits of the reactive simulatability/UC of Dolev-Yao models with hashes. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. LNCS, vol. 4189, pp. 404-423. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4189 , pp. 404-423
    • Backes, M.1    Pfitzmann, B.2    Waidner, M.3
  • 9
    • 22444455879 scopus 로고    scopus 로고
    • Kerberos version IV: Inductive analysis of the secrecy goals
    • Quisquater, J.-J, Deswarte, Y, Meadows, C, Gollmann, D, eds, ESORICS 1998, Springer, Heidelberg
    • Bella, G., Paulson, L.C.: Kerberos version IV: Inductive analysis of the secrecy goals. In: Quisquater, J.-J., Deswarte, Y., Meadows, C., Gollmann, D. (eds.) ESORICS 1998. LNCS, vol. 1485, pp. 361-375. Springer, Heidelberg (1998)
    • (1998) LNCS , vol.1485 , pp. 361-375
    • Bella, G.1    Paulson, L.C.2
  • 10
    • 84948957152 scopus 로고    scopus 로고
    • Public-key encryption in a multi-user setting: Security proofs and improvements
    • Preneel. B, ed, EUROCRYPT 2000, Springer. Heidelberg
    • Bellare, M., Boldyreva, A. Micali, S.: Public-key encryption in a multi-user setting: Security proofs and improvements. In: Preneel. B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 259-274. Springer. Heidelberg (2000)
    • (2000) LNCS , vol.1807 , pp. 259-274
    • Bellare, M.1    Boldyreva, A.2    Micali, S.3
  • 11
    • 84937407719 scopus 로고    scopus 로고
    • Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
    • Okamoto, T, ed, ASIACRYPT 2000, Springer, Heidelberg
    • Bellare, M., Namprempre, C.: Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 531-545. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1976 , pp. 531-545
    • Bellare, M.1    Namprempre, C.2
  • 13
    • 84945119254 scopus 로고
    • Entity authentication and key distribution
    • Stinson, D.R, ed, CRYPTO 1993, Springer, Heidelberg
    • Bellare, M., Rogaway, P.: Entity authentication and key distribution. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 232-249. Springer, Heidelberg (1994)
    • (1994) LNCS , vol.773 , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 14
    • 34548797158 scopus 로고    scopus 로고
    • Provable-security analysis of authenticated encryption in Kerberos
    • Boldyreva, A., Kumar, V.: Provable-security analysis of authenticated encryption in Kerberos. In: Proc. IEEE Security and Privacy (2007)
    • (2007) Proc. IEEE Security and Privacy
    • Boldyreva, A.1    Kumar, V.2
  • 15
    • 38049082991 scopus 로고    scopus 로고
    • A Generalization of DDH with Applications to Protocol Analysis and Computational Soundness
    • Menezes, A, ed, CRYPTO 2007, Springer, Heidelberg
    • Bresson, E., Lakhnech, Y., Mazare, L., Warinschi, B.: A Generalization of DDH with Applications to Protocol Analysis and Computational Soundness. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4622
    • Bresson, E.1    Lakhnech, Y.2    Mazare, L.3    Warinschi, B.4
  • 17
    • 84880897758 scopus 로고    scopus 로고
    • Universally composable commitments
    • Kilian, J, ed, CRYPTO 2001, Springer, Heidelberg
    • Canetti, R., Fischlin, M.: Universally composable commitments. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 19-40. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2139 , pp. 19-40
    • Canetti, R.1    Fischlin, M.2
  • 18
    • 33745528593 scopus 로고    scopus 로고
    • Canetti, R., Herzog, J.: Universally composable symbolic analysis of mutual authentication and key-exchange protocols. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS. 3876. pp. 380-403. Springer, Heidelberg (2006)
    • Canetti, R., Herzog, J.: Universally composable symbolic analysis of mutual authentication and key-exchange protocols. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS. vol. 3876. pp. 380-403. Springer, Heidelberg (2006)
  • 19
    • 49949119291 scopus 로고    scopus 로고
    • Cervesato, I., Jaggard, A., Seedrov, A., Tsay, J.-K., Walstad, C.: Breaking and fixing public-key Kerberos. In: Okada, M., Satoh, I. (eds.) ASIAN 2006. LNCS, 4435, pp. 167-181. Springer, Heidelberg (2008)
    • Cervesato, I., Jaggard, A., Seedrov, A., Tsay, J.-K., Walstad, C.: Breaking and fixing public-key Kerberos. In: Okada, M., Satoh, I. (eds.) ASIAN 2006. LNCS, vol. 4435, pp. 167-181. Springer, Heidelberg (2008)
  • 20
    • 28144435566 scopus 로고    scopus 로고
    • Cervesato, L. Meadows, C. Pavlovic, D.: An encapsulated authentication logic for reasoning about key distribution protocols. In: CSFW, pp. 48-61 (2005)
    • Cervesato, L. Meadows, C. Pavlovic, D.: An encapsulated authentication logic for reasoning about key distribution protocols. In: CSFW, pp. 48-61 (2005)
  • 21
    • 33746351314 scopus 로고    scopus 로고
    • Key derivation and randomness extraction. Cryptology ePrint Archive
    • Report 2005/061
    • Chevassut, O., Fouque, P.-A., Gaudry, P., Pointcheval, D.: Key derivation and randomness extraction. Cryptology ePrint Archive, Report 2005/061 (2005). http://eprint.iacr.org/
    • (2005)
    • Chevassut, O.1    Fouque, P.-A.2    Gaudry, P.3    Pointcheval, D.4
  • 22
    • 24644437051 scopus 로고    scopus 로고
    • Cortier, V., Warinschi, B.: Computationally sound, automated proofs for security protocols. In: Sagiv, M. (ed.) ESOP 2005. LNCS, 3444, pp. 157-171. Springer, Heidelberg (2005)
    • Cortier, V., Warinschi, B.: Computationally sound, automated proofs for security protocols. In: Sagiv, M. (ed.) ESOP 2005. LNCS, vol. 3444, pp. 157-171. Springer, Heidelberg (2005)
  • 23
    • 33745534937 scopus 로고    scopus 로고
    • Datta, A., Derek, A., Mitchell, J., Ramanathan, A., Seedrov, A.: Games and the impossibility of realizable ideal functionality. In: TCC, pp. 360-379 (2006)
    • Datta, A., Derek, A., Mitchell, J., Ramanathan, A., Seedrov, A.: Games and the impossibility of realizable ideal functionality. In: TCC, pp. 360-379 (2006)
  • 26
    • 26444565771 scopus 로고    scopus 로고
    • Probabilistic polynomial-time semantics for a protocol security logic
    • Caires, L, Italiano, G.F, Monteiro, L, Palamidessi, C, Yung, M, eds, ICALP 2005, Springer, Heidelberg
    • Datta, A., Derek, A., Mitchell, J.C., Shmatikov, V., Turuani, M.: Probabilistic polynomial-time semantics for a protocol security logic. In: Caires, L., Italiano, G.F., Monteiro, L., Palamidessi, C., Yung, M. (eds.) ICALP 2005. LNCS, vol. 3580, pp. 16-29. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3580 , pp. 16-29
    • Datta, A.1    Derek, A.2    Mitchell, J.C.3    Shmatikov, V.4    Turuani, M.5
  • 30
    • 12144271120 scopus 로고    scopus 로고
    • The Diffie-Hellman key-agreement scheme in the strand-space model
    • IEEE Computer Society Press, Los Alamitos
    • Herzog, J.: The Diffie-Hellman key-agreement scheme in the strand-space model. In: Proceedings of 16th IEEE Computer Security Foundations Workshop, pp. 234-247. IEEE Computer Society Press, Los Alamitos (2003)
    • (2003) Proceedings of 16th IEEE Computer Security Foundations Workshop , pp. 234-247
    • Herzog, J.1
  • 32
    • 24644476184 scopus 로고    scopus 로고
    • Janvier, R., Mazare. L., Lakhnech. Y.: Completing the picture: Soundness of formal encryption in the presence of active adversaries. In: Sagiv, M. (ed.) ESOP 2005. LNCS, 3444, pp. 172-185. Springer, Heidelberg (2005)
    • Janvier, R., Mazare. L., Lakhnech. Y.: Completing the picture: Soundness of formal encryption in the presence of active adversaries. In: Sagiv, M. (ed.) ESOP 2005. LNCS, vol. 3444, pp. 172-185. Springer, Heidelberg (2005)
  • 33
    • 84974720881 scopus 로고    scopus 로고
    • Katz, J., Yung, M.: Unforgeable encryption and chosen ciphertext secure modes of operation. In: Schneier. B. (ed.) FSE 2000. LNCS, 1978, pp. 284-299. Springer, Heidelberg (2001)
    • Katz, J., Yung, M.: Unforgeable encryption and chosen ciphertext secure modes of operation. In: Schneier. B. (ed.) FSE 2000. LNCS, vol. 1978, pp. 284-299. Springer, Heidelberg (2001)
  • 36
    • 77957106539 scopus 로고    scopus 로고
    • Computationally sound verifiation of security protocols using Diffie-Hellman exponentiation. Cryptology ePrint Archive
    • Report 2005/097
    • Lakhnech, Y., Mazaré. L.: Computationally sound verifiation of security protocols using Diffie-Hellman exponentiation. Cryptology ePrint Archive: Report 2005/097 (2005)
    • (2005)
    • Lakhnech, Y.1    Mazaré, L.2
  • 37
    • 0344875571 scopus 로고    scopus 로고
    • Micciancio, D., Warinschi, B.: Completeness theorems for the Abadi-Rogaway logic of encrypted expressions. Journal of Computer Security 12(1), 99-129 (2004). Preliminary version in WITS 2002
    • Micciancio, D., Warinschi, B.: Completeness theorems for the Abadi-Rogaway logic of encrypted expressions. Journal of Computer Security 12(1), 99-129 (2004). Preliminary version in WITS 2002
  • 38
    • 35048899313 scopus 로고    scopus 로고
    • Micciancio, D., Warinschi, B.: Soundness of formal encryption in the presence of active adversaries. In: Naor, M. (ed.) TCC 2004. LNCS, 2951, pp. 133-151. Springer, Heidelberg (2004)
    • Micciancio, D., Warinschi, B.: Soundness of formal encryption in the presence of active adversaries. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 133-151. Springer, Heidelberg (2004)
  • 39
    • 38049030237 scopus 로고    scopus 로고
    • Inductive proofs of computational secrecy
    • Biskup, J, López, J, eds, ESORICS 2007, Springer, Heidelberg
    • Roy, A., Datta, A., Derek, A., Mitchell, J.C.: Inductive proofs of computational secrecy. In: Biskup, J., López, J. (eds.) ESORICS 2007. LNCS. vol. 4734, pp. 219-234. Springer, Heidelberg (2007), http://www.stanford. edu/arnab/rddm-Induct iveProofs.pdf
    • (2007) LNCS , vol.4734 , pp. 219-234
    • Roy, A.1    Datta, A.2    Derek, A.3    Mitchell, J.C.4
  • 40
    • 41549138983 scopus 로고    scopus 로고
    • Roy, A., Datta, A., Derek, A., Mitchell, J.C.: Inductive trace properties for computational security. In: WITS (2007). http://www.stanford.edu/arnab/ rddm-IndTraceProps.pdf
    • Roy, A., Datta, A., Derek, A., Mitchell, J.C.: Inductive trace properties for computational security. In: WITS (2007). http://www.stanford.edu/arnab/ rddm-IndTraceProps.pdf
  • 43
    • 41549098491 scopus 로고    scopus 로고
    • Zhu, L., Tung, B.: Public Key Cryptography for Initial Authentication in Kerberos (PKINIT). RFC 4556 (Proposed Standard) (June 2006)
    • Zhu, L., Tung, B.: Public Key Cryptography for Initial Authentication in Kerberos (PKINIT). RFC 4556 (Proposed Standard) (June 2006)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.