메뉴 건너뛰기




Volumn 21, Issue 4, 2008, Pages 492-546

On the relationships between notions of simulation-based security

Author keywords

Black box simulatability; Process calculus; Reactive simulatability; Simulation based security; Universal composability

Indexed keywords

BLACK-BOX SIMULATABILITY; PROCESS CALCULUS; REACTIVE SIMULATABILITY; SIMULATION-BASED SECURITY; UNIVERSAL COMPOSABILITY;

EID: 51249096967     PISSN: 09332790     EISSN: 14321378     Source Type: Journal    
DOI: 10.1007/s00145-008-9019-9     Document Type: Article
Times cited : (22)

References (32)
  • 2
    • 84947720399 scopus 로고    scopus 로고
    • A bisimulation method for cryptographic protocol
    • Proc. ESOP'98. (Springer Berlin)
    • M. Abadi, A.D. Gordon, A bisimulation method for cryptographic protocol, in Proc. ESOP'98. Lecture Notes in Computer Science, vol. 1381 (Springer, Berlin, 1998), pp. 12-26
    • (1998) Lecture Notes in Computer Science , vol.1381 , pp. 12-26
    • Abadi, M.1    Gordon, A.D.2
  • 3
    • 0003092378 scopus 로고    scopus 로고
    • A calculus for cryptographic protocols: The spi calculus
    • Expanded version available as SRC research report 149, January 1998
    • M. Abadi, A.D. Gordon, A calculus for cryptographic protocols: the spi calculus, Inf. Comput. 143, 1-70 (1999). Expanded version available as SRC research report 149, January 1998
    • (1999) Inf. Comput. , vol.143 , pp. 1-70
    • Abadi, M.1    Gordon, A.D.2
  • 4
    • 35048854169 scopus 로고    scopus 로고
    • A general composition theorem for secure reactive systems
    • Proceedings of the 1st Theory of Cryptography Conference (TCC 2004). (Springer Berlin)
    • M. Backes, B. Pfitzmann, M. Waidner, A general composition theorem for secure reactive systems, in Proceedings of the 1st Theory of Cryptography Conference (TCC 2004). Lecture Notes in Computer Science, vol. 2951 (Springer, Berlin, 2004), pp. 336-354
    • (2004) Lecture Notes in Computer Science , vol.2951 , pp. 336-354
    • Backes, M.1    Pfitzmann, B.2    Waidner, M.3
  • 7
    • 35248841072 scopus 로고    scopus 로고
    • Reactively secure signature schemes
    • Proceedings of 6th Information Security Conference. (Springer Berlin)
    • M. Backes, B. Pfitzmann, M. Waidner, Reactively secure signature schemes, in Proceedings of 6th Information Security Conference. Lecture Notes in Computer Science, vol. 2851 (Springer, Berlin, 2003), pp. 84-95
    • (2003) Lecture Notes in Computer Science , vol.2851 , pp. 84-95
    • Backes, M.1    Pfitzmann, B.2    Waidner, M.3
  • 10
    • 51249098563 scopus 로고    scopus 로고
    • Personal communication
    • R. Canetti, Personal communication, 2004
    • (2004)
    • Canetti, R.1
  • 12
    • 84880897758 scopus 로고    scopus 로고
    • Universally composable commitments
    • Proc. CRYPTO 2001, Santa Barbara, California. (Springer Berlin)
    • R. Canetti, M. Fischlin, Universally composable commitments, in Proc. CRYPTO 2001, Santa Barbara, California. Lecture Notes in Computer Science, vol. 2139 (Springer, Berlin, 2001), pp. 19-40
    • (2001) Lecture Notes in Computer Science , vol.2139 , pp. 19-40
    • Canetti, R.1    Fischlin, M.2
  • 13
    • 84947232363 scopus 로고    scopus 로고
    • Universally composable notions of key exchange and secure channels
    • Advances in Cryptology-EUROCRYPT 2002. (Springer Berlin)
    • R. Canetti, H. Krawczyk, Universally composable notions of key exchange and secure channels, in Advances in Cryptology-EUROCRYPT 2002. Lecture Notes in Computer Science, vol. 2332 (Springer, Berlin, 2002), pp. 337-351
    • (2002) Lecture Notes in Computer Science , vol.2332 , pp. 337-351
    • Canetti, R.1    Krawczyk, H.2
  • 14
    • 35248854495 scopus 로고    scopus 로고
    • On the limitations of universally composable two-party computation without set-up assumptions
    • Advances in Cryptology-EUROCRYPT 2003. (Springer Berlin)
    • R. Canetti, E. Kushilevitz, Y. Lindell, On the limitations of universally composable two-party computation without set-up assumptions, in Advances in Cryptology-EUROCRYPT 2003. Lecture Notes in Computer Science, vol. 2656 (Springer, Berlin, 2003), pp. 68-86
    • (2003) Lecture Notes in Computer Science , vol.2656 , pp. 68-86
    • Canetti, R.1    Kushilevitz, E.2    Lindell, Y.3
  • 17
    • 24144434371 scopus 로고    scopus 로고
    • On the relationships between notions of simulation-based security
    • Proceedings of the 2nd Theory of Cryptography Conference (TCC 2005), ed. by J. Kilian. (Springer Berlin)
    • A. Datta, R. Küsters, J.C. Mitchell, A. Ramanathan, On the relationships between notions of simulation-based security, in Proceedings of the 2nd Theory of Cryptography Conference (TCC 2005), ed. by J. Kilian. Lecture Notes in Computer Science, vol. 3378 (Springer, Berlin, 2005), pp. 476-494
    • (2005) Lecture Notes in Computer Science , vol.3378 , pp. 476-494
    • Datta, A.1    Küsters, R.2    Mitchell, J.C.3    Ramanathan, A.4
  • 21
    • 24144472250 scopus 로고    scopus 로고
    • Comparing two notions of simulatability
    • Theory of Cryptography, Proceedings of TCC 2005, ed. by J. Kilian. (Springer Berlin)
    • D. Hofheinz, D. Unruh, Comparing two notions of simulatability, in Theory of Cryptography, Proceedings of TCC 2005, ed. by J. Kilian. Lecture Notes in Computer Science, vol. 3378 (Springer, Berlin, 2005), pp. 86-103
    • (2005) Lecture Notes in Computer Science , vol.3378 , pp. 86-103
    • Hofheinz, D.1    Unruh, D.2
  • 24
    • 84958052989 scopus 로고    scopus 로고
    • Probabilistic polynomial-time equivalence and security protocols
    • Formal Methods World Congress, vol. I, Toulouse, France, ed. by J.M. Wing, J. Woodcock. (Springer Berlin)
    • P.D. Lincoln, J.C. Mitchell, M. Mitchell, A. Scedrov, Probabilistic polynomial-time equivalence and security protocols, in Formal Methods World Congress, vol. I, Toulouse, France, ed. by J.M. Wing, J. Woodcock. Lecture Notes in Computer Science, vol. 1708 (Springer, Berlin, 1999), pp. 776-793
    • (1999) Lecture Notes in Computer Science , vol.1708 , pp. 776-793
    • Lincoln, P.D.1    Mitchell, J.C.2    Mitchell, M.3    Scedrov, A.4
  • 27
    • 0032307051 scopus 로고    scopus 로고
    • A linguistic characterization of bounded oracle computation and probabilistic polynomial time
    • Palo Alto, California (IEEE, New York)
    • J.C. Mitchell, M. Mitchell, A. Scedrov, A linguistic characterization of bounded oracle computation and probabilistic polynomial time, in Proc. 39th Annual IEEE Symposium on the Foundations of Computer Science, Palo Alto, California (IEEE, New York, 1998), pp. 725-733
    • (1998) Proc. 39th Annual IEEE Symposium on the Foundations of Computer Science , pp. 725-733
    • Mitchell, J.C.1    Mitchell, M.2    Scedrov, A.3
  • 28
    • 1442267753 scopus 로고    scopus 로고
    • A probabilistic polynomial-time calculus for the analysis of cryptographic protocols (preliminary report)
    • 17th Annual Conference on the Mathematical Foundations of Programming Semantics, Arhus, Denmark, May, 2001, ed. by S. Brookes, M. Mislove
    • J.C. Mitchell, A. Ramanathan, A. Scedrov, V. Teague, A probabilistic polynomial-time calculus for the analysis of cryptographic protocols (preliminary report), in 17th Annual Conference on the Mathematical Foundations of Programming Semantics, Arhus, Denmark, May, 2001, ed. by S. Brookes, M. Mislove. Electronic Notes in Theoretical Computer Science, vol. 45, 2001
    • (2001) Electronic Notes in Theoretical Computer Science , vol.45
    • Mitchell, J.C.1    Ramanathan, A.2    Scedrov, A.3    Teague, V.4
  • 29
    • 33244491452 scopus 로고    scopus 로고
    • A probabilistic polynomial-time process calculus for the analysis of cryptographic protocols
    • 1-3
    • J.C. Mitchell, A. Ramanathan, A. Scedrov, V. Teague, A probabilistic polynomial-time process calculus for the analysis of cryptographic protocols, Theor. Comput. Sci. 353(1-3), 118-164 (2006)
    • (2006) Theor. Comput. Sci. , vol.353 , pp. 118-164
    • Mitchell, J.C.1    Ramanathan, A.2    Scedrov, A.3    Teague, V.4
  • 30
    • 0034823388 scopus 로고    scopus 로고
    • A model for asynchronous reactive systems and its application to secure message transmission
    • IEEE Computer Society Press Los Alamitos
    • B. Pfitzmann, M. Waidner, A model for asynchronous reactive systems and its application to secure message transmission, in IEEE Symposium on Security and Privacy (S&P 2001) (IEEE Computer Society Press, Los Alamitos, 2001), pp. 184-200
    • (2001) IEEE Symposium on Security and Privacy (S&P 2001) , pp. 184-200
    • Pfitzmann, B.1    Waidner, M.2
  • 32
    • 35048876713 scopus 로고    scopus 로고
    • Probabilistic bisimulation and equivalence for security analysis of network protocols
    • FOSSACS 2004-Foundations of Software Science and Computation Structures. (Springer Berlin). Summarizes results in [31]
    • A. Ramanathan, J.C. Mitchell, A. Scedrov, V. Teague, Probabilistic bisimulation and equivalence for security analysis of network protocols, in FOSSACS 2004-Foundations of Software Science and Computation Structures. Lecture Notes in Computer Science, vol. 2987 (Springer, Berlin, 2004), pp. 468-483. Summarizes results in [31]
    • (2004) Lecture Notes in Computer Science , vol.2987 , pp. 468-483
    • Ramanathan, A.1    Mitchell, J.C.2    Scedrov, A.3    Teague, V.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.