메뉴 건너뛰기




Volumn 16, Issue 5, 2008, Pages 497-530

Key-dependent message security under active attacks - BRSIM/UC-soundness of Dolev-Yao-style encryption with key cycles

Author keywords

[No Author keywords available]

Indexed keywords

ACTIVE ATTACKS; ADAPTIVE; BLACK-BOX; CIPHERTEXTS; COMPUTATIONAL SOUNDNESSES; ON CURRENTS; REACTIVE SIMULATABILITY; SECURITY PROTOCOLS; SYMMETRIC ENCRYPTIONS;

EID: 54349106924     PISSN: 0926227X     EISSN: None     Source Type: Journal    
DOI: 10.3233/JCS-2008-0332     Document Type: Conference Paper
Times cited : (18)

References (36)
  • 1
    • 84978977131 scopus 로고    scopus 로고
    • M. Abadi and J. Jürjens, Formal eavesdropping and its computational interpretation, in: Proc. 4th International Symposium on Theoretical Aspects of Computer Software TACS, 2001, pp. 82-94
    • M. Abadi and J. Jürjens, Formal eavesdropping and its computational interpretation, in: Proc. 4th International Symposium on Theoretical Aspects of Computer Software (TACS), 2001, pp. 82-94.
  • 2
    • 84879078812 scopus 로고    scopus 로고
    • Reconciling two views of cryptography: The computational soundness of formal encryption
    • Proc. 1st IFIP International Conference on Theoretical Computer Science, Springer
    • M. Abadi and P. Rogaway, Reconciling two views of cryptography: The computational soundness of formal encryption, in: Proc. 1st IFIP International Conference on Theoretical Computer Science, Lecture Notes in Computer Science, Vol. 1872, Springer, 2000, pp. 3-22.
    • (2000) Lecture Notes in Computer Science , vol.1872 , pp. 3-22
    • Abadi, M.1    Rogaway, P.2
  • 3
    • 33646045378 scopus 로고    scopus 로고
    • Soundness of formal encryption in the presence of keycycles
    • Proc. 10th European Symposium on Research in Computer Security ESORICS, Springer
    • P. Adão, G. Bana, J. Herzog and A. Scedrov, Soundness of formal encryption in the presence of keycycles, in: Proc. 10th European Symposium on Research in Computer Security (ESORICS), Lecture Notes in Computer Science, Vol. 3679, Springer, 2005, pp. 374-396.
    • (2005) Lecture Notes in Computer Science , vol.3679 , pp. 374-396
    • Adão, P.1    Bana, G.2    Herzog, J.3    Scedrov, A.4
  • 6
    • 1442292329 scopus 로고    scopus 로고
    • M. Backes, B. Pfitzmann and M. Waidner, A composable cryptographic library with nested operations (extended abstract), in: Proc. 10th ACM Conference on Computer and Communications Security, 2003, pp. 220-230. (Full version in IACR Cryptology ePrint Archive 2003/015, Jan. 2003, http://eprint.iacr.org/.)
    • M. Backes, B. Pfitzmann and M. Waidner, A composable cryptographic library with nested operations (extended abstract), in: Proc. 10th ACM Conference on Computer and Communications Security, 2003, pp. 220-230. (Full version in IACR Cryptology ePrint Archive 2003/015, Jan. 2003, http://eprint.iacr.org/.)
  • 7
    • 84855205195 scopus 로고    scopus 로고
    • The reactive simulatability (RSIM) framework for asynchronous systems
    • M. Backes, B. Pfitzmann and M. Waidner, The reactive simulatability (RSIM) framework for asynchronous systems, Information and Computation 205(12) (2007), 1685-1720.
    • (2007) Information and Computation , vol.205 , Issue.12 , pp. 1685-1720
    • Backes, M.1    Pfitzmann, B.2    Waidner, M.3
  • 8
    • 33746365751 scopus 로고
    • Secure multiparty protocols and zero knowledge proof systems tolerating a faulty minority
    • D. Beaver, Secure multiparty protocols and zero knowledge proof systems tolerating a faulty minority, Journal of Cryptology 4(2) (1991), 75-122.
    • (1991) Journal of Cryptology , vol.4 , Issue.2 , pp. 75-122
    • Beaver, D.1
  • 10
    • 84957629783 scopus 로고    scopus 로고
    • Relations among notions of security for publickey encryption schemes
    • Advances in Cryptology: CRYPTO '98, Springer
    • M. Bellare, A. Desai, D. Pointcheval and P. Rogaway, Relations among notions of security for publickey encryption schemes, in: Advances in Cryptology: CRYPTO '98, Lecture Notes in Computer Science, Vol. 1462, Springer, 1998, pp. 26-45.
    • (1998) Lecture Notes in Computer Science , vol.1462 , pp. 26-45
    • Bellare, M.1    Desai, A.2    Pointcheval, D.3    Rogaway, P.4
  • 11
    • 84937407719 scopus 로고    scopus 로고
    • Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
    • Advances in Cryptology: ASIACRYPT 2000, Springer
    • M. Bellare and C. Namprempre, Authenticated encryption: Relations among notions and analysis of the generic composition paradigm, in: Advances in Cryptology: ASIACRYPT 2000, Lecture Notes in Computer Science, Vol. 1976, Springer, 2000, pp. 531-545.
    • (2000) Lecture Notes in Computer Science , vol.1976 , pp. 531-545
    • Bellare, M.1    Namprempre, C.2
  • 13
    • 84945135810 scopus 로고    scopus 로고
    • An efficient system for non-transferable anonymous credentials with optional anonymity revocation
    • Advances in Cryptology: EUROCRYPT 2001, Springer
    • J. Camenisch and A. Lysyanskaya, An efficient system for non-transferable anonymous credentials with optional anonymity revocation, in: Advances in Cryptology: EUROCRYPT 2001, Lecture Notes in Computer Science, Vol. 2045, Springer, 2001, pp. 93-118.
    • (2001) Lecture Notes in Computer Science , vol.2045 , pp. 93-118
    • Camenisch, J.1    Lysyanskaya, A.2
  • 14
    • 0000731055 scopus 로고    scopus 로고
    • Security and composition of multiparty cryptographic protocols
    • R. Canetti, Security and composition of multiparty cryptographic protocols, Journal of Cryptology 3(1) (2000), 143-202.
    • (2000) Journal of Cryptology , vol.3 , Issue.1 , pp. 143-202
    • Canetti, R.1
  • 15
    • 0035163054 scopus 로고    scopus 로고
    • R. Canetti, Universally composable security: A new paradigm for cryptographic protocols, in: Proc. 42nd IEEE Symposium on Foundations of Computer Science (FOCS), 2001, pp. 136-145. (Extended version in Cryptology ePrint Archive, Report 2000/67, http://eprint.iacr.org/.)
    • R. Canetti, Universally composable security: A new paradigm for cryptographic protocols, in: Proc. 42nd IEEE Symposium on Foundations of Computer Science (FOCS), 2001, pp. 136-145. (Extended version in Cryptology ePrint Archive, Report 2000/67, http://eprint.iacr.org/.)
  • 16
    • 33745528593 scopus 로고    scopus 로고
    • Universally composable symbolic analysis of mutual authentication and key exchange protocols
    • Proc. 3rd Theory of Cryptography Conference TCC, Springer
    • R. Canetti and J. Herzog, Universally composable symbolic analysis of mutual authentication and key exchange protocols, in: Proc. 3rd Theory of Cryptography Conference (TCC), Lecture Notes in Computer Science, Vol. 3876, Springer, 2006, pp. 380-403.
    • (2006) Lecture Notes in Computer Science , vol.3876 , pp. 380-403
    • Canetti, R.1    Herzog, J.2
  • 22
    • 84955564077 scopus 로고
    • Fair computation of general functions in presence of immoral majority
    • Advances in Cryptology: CRYPTO '90, Springer
    • S. Goldwasser and L. Levin, Fair computation of general functions in presence of immoral majority, in: Advances in Cryptology: CRYPTO '90, Lecture Notes in Computer Science, Vol. 537, Springer, 1990, pp. 77-93.
    • (1990) Lecture Notes in Computer Science , vol.537 , pp. 77-93
    • Goldwasser, S.1    Levin, L.2
  • 24
    • 61749103962 scopus 로고    scopus 로고
    • S. Halevi and H. Krawczyk, Security under key-dependent inputs, in: Proc. of the 14th ACM Conference on Computer and Communications Security, 2007, pp. 466-475. (Preprint on IACR ePrint 2007/315.)
    • S. Halevi and H. Krawczyk, Security under key-dependent inputs, in: Proc. of the 14th ACM Conference on Computer and Communications Security, 2007, pp. 466-475. (Preprint on IACR ePrint 2007/315.)
  • 25
    • 44449114656 scopus 로고    scopus 로고
    • D. Hofheinz and D. Unruh, Towards key-dependent message security in the standard model, in: Proc. of Advances in Cryptology: EUROCRYPT 2008, August 2007, Lecture Notes in Computes Science, 4965, Springer, 2008, pp. 108-126. (Preprint on IACR ePrint 2007/333.)
    • D. Hofheinz and D. Unruh, Towards key-dependent message security in the standard model, in: Proc. of Advances in Cryptology: EUROCRYPT 2008, August 2007, Lecture Notes in Computes Science, Vol. 4965, Springer, 2008, pp. 108-126. (Preprint on IACR ePrint 2007/333.)
  • 26
    • 84945249768 scopus 로고    scopus 로고
    • Semantics and program analysis of computationally secure information flow
    • P. Laud, Semantics and program analysis of computationally secure information flow, in: Proc. 10th European Symposium on Programming (ESOP), 2001, pp. 77-91.
    • (2001) Proc. 10th European Symposium on Programming (ESOP) , pp. 77-91
    • Laud, P.1
  • 27
    • 3543052976 scopus 로고    scopus 로고
    • Symmetric encryption in automatic analyses for confidentiality against active adversaries
    • P. Laud, Symmetric encryption in automatic analyses for confidentiality against active adversaries, in: Proc. 25th IEEE Symposium on Security & Privacy, 2004, pp. 71-85.
    • (2004) Proc. 25th IEEE Symposium on Security & Privacy , pp. 71-85
    • Laud, P.1
  • 29
  • 30
    • 84974655726 scopus 로고
    • Secure computation
    • Advances in Cryptology: CRYPTO '91, Springer
    • S. Micali and P. Rogaway, Secure computation, in: Advances in Cryptology: CRYPTO '91, Lecture Notes in Computer Science, Vol. 576, Springer, 1991, pp. 392-404.
    • (1991) Lecture Notes in Computer Science , vol.576 , pp. 392-404
    • Micali, S.1    Rogaway, P.2
  • 31
    • 35048899313 scopus 로고    scopus 로고
    • Soundness of formal encryption in the presence of active adversaries
    • Proc. 1st Theory of Cryptography Conference TCC, Springer
    • D. Micciancio and B. Warinschi, Soundness of formal encryption in the presence of active adversaries, in: Proc. 1st Theory of Cryptography Conference (TCC), Lecture Notes in Computer Science, Vol. 2951, Springer, 2004, pp. 133-151.
    • (2004) Lecture Notes in Computer Science , vol.2951 , pp. 133-151
    • Micciancio, D.1    Warinschi, B.2
  • 32
    • 0034447081 scopus 로고    scopus 로고
    • B. Pfitzmann and M. Waidner, Composition and integrity preservation of secure reactive systems, in: Proc. 7th ACM Conference on Computer and Communications Security, 2000, pp. 245-254. (Extended version (with Matthias Schunter) IBM Research Report RZ 3206, May 2000, http://www.semper.org/sirene/ publ/PfSW1_00ReactSimulIBM.ps.gz.)
    • B. Pfitzmann and M. Waidner, Composition and integrity preservation of secure reactive systems, in: Proc. 7th ACM Conference on Computer and Communications Security, 2000, pp. 245-254. (Extended version (with Matthias Schunter) IBM Research Report RZ 3206, May 2000, http://www.semper.org/sirene/ publ/PfSW1_00ReactSimulIBM.ps.gz.)
  • 33
    • 0034823388 scopus 로고    scopus 로고
    • B. Pfitzmann and M. Waidner, A model for asynchronous reactive systems and its application to secure message transmission, in: Proc. 22nd IEEE Symposium on Security & Privacy, 2001, pp. 184-200. (Extended version of the model (with Michael Backes) IACR Cryptology ePrint Archive 2004/082, http://eprint.iacr.org/.)
    • B. Pfitzmann and M. Waidner, A model for asynchronous reactive systems and its application to secure message transmission, in: Proc. 22nd IEEE Symposium on Security & Privacy, 2001, pp. 184-200. (Extended version of the model (with Michael Backes) IACR Cryptology ePrint Archive 2004/082, http://eprint.iacr.org/.)
  • 34
    • 84974554584 scopus 로고
    • Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack
    • Advances in Ciyptology: CRYPTO'91, Springer
    • C. Rackoff and D.R. Simon, Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack, in: Advances in Ciyptology: CRYPTO'91, Lecture Notes in Computer Science, Vol. 576, Springer, 1992, pp. 433-444.
    • (1992) Lecture Notes in Computer Science , vol.576 , pp. 433-444
    • Rackoff, C.1    Simon, D.R.2
  • 35
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • C.E. Shannon, Communication theory of secrecy systems, Bell System Technical Journal 28(4) (1949), 656-715.
    • (1949) Bell System Technical Journal , vol.28 , Issue.4 , pp. 656-715
    • Shannon, C.E.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.