메뉴 건너뛰기




Volumn , Issue , 2009, Pages 293-307

Universally composable symmetric encryption

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATED ENCRYPTION; COMMITMENT PROBLEM; CRYPTOGRAPHIC ASSUMPTIONS; DIGITAL SIGNATURE; IND-CCA; KEY EXCHANGE; PUBLIC-KEY ENCRYPTION; SECURITY SETTINGS; SIMULATION-BASED; SIMULATION-BASED SECURITY; SYMMETRIC ENCRYPTION; SYMMETRIC ENCRYPTION SCHEMES; UNIVERSALLY COMPOSABLE;

EID: 70350540703     PISSN: 19401434     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSF.2009.18     Document Type: Conference Paper
Times cited : (16)

References (31)
  • 1
    • 84879078812 scopus 로고    scopus 로고
    • Reconciling two views of cryptography (the computational soundness of formal encryption)
    • Jan van Leeuwen, Osamu Watanabe, Masami Hagiya, Peter D. Mosses, and Takayasu Ito, editors, Theoretical Computer Science, Exploring New Frontiers of Theoretical Informatics, International Conference IFIPTCS 2000, of, Springer-Verlag
    • M. Abadi and P. Rogaway. Reconciling two views of cryptography (the computational soundness of formal encryption). In Jan van Leeuwen, Osamu Watanabe, Masami Hagiya, Peter D. Mosses, and Takayasu Ito, editors, Theoretical Computer Science, Exploring New Frontiers of Theoretical Informatics, International Conference (IFIPTCS 2000), volume 1872 of Lecture Notes in Computer Science, pages 3-22. Springer-Verlag, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1872 , pp. 3-22
    • Abadi, M.1    Rogaway, P.2
  • 2
    • 35048853239 scopus 로고    scopus 로고
    • How to Break and Repair a Universally Composable Signature Functionality
    • Kan Zhang and Yuliang Zheng, editors, Information Security, 7th International Conference, ISC 2004, Proceedings, of, Springer
    • M. Backes and D. Hofheinz. How to Break and Repair a Universally Composable Signature Functionality. In Kan Zhang and Yuliang Zheng, editors, Information Security, 7th International Conference, ISC 2004, Proceedings, volume 3225 of Lecture Notes in Computer Science, pages 61-72. Springer, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3225 , pp. 61-72
    • Backes, M.1    Hofheinz, D.2
  • 3
    • 4944234643 scopus 로고    scopus 로고
    • Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library
    • IEEE Computer Society
    • M. Backes and B. Pfitzmann. Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library. In 17th IEEE Computer Security Foundations Workshop (CSFW-17 2004), pages 204-218. IEEE Computer Society, 2004.
    • (2004) 17th IEEE Computer Security Foundations Workshop (CSFW-17 2004) , pp. 204-218
    • Backes, M.1    Pfitzmann, B.2
  • 4
    • 54349106924 scopus 로고    scopus 로고
    • Key-dependent Message Security under Active Attacks - BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles
    • M. Backes, B. Pfitzmann, and A. Scedrov. Key-dependent Message Security under Active Attacks - BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles. Journal of Computer Security (JCS), 2008.
    • (2008) Journal of Computer Security (JCS)
    • Backes, M.1    Pfitzmann, B.2    Scedrov, A.3
  • 6
    • 84937407719 scopus 로고    scopus 로고
    • Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm
    • Tatsuaki Okamoto, editor, Advances in Cryptology, ASIACRYPT 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security, 2000, Proceedings, of, Springer
    • M. Bellare and C. Namprempre. Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm. In Tatsuaki Okamoto, editor, Advances in Cryptology - ASIACRYPT 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security, 2000, Proceedings, volume 1976 of Lecture Notes in Computer Science, pages 531-545. Springer, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1976 , pp. 531-545
    • Bellare, M.1    Namprempre, C.2
  • 8
    • 35248822352 scopus 로고    scopus 로고
    • Encryption-Scheme Security in the Presence of Key-Dependent Messages
    • Kaisa Nyberg and Howard M. Heys, editors, Selected Areas in Cryptography, 9th Annual International Workshop SAC 2002, of, Springer
    • J. Black, Ph. Rogaway, and Th. Shrimpton. Encryption-Scheme Security in the Presence of Key-Dependent Messages. In Kaisa Nyberg and Howard M. Heys, editors, Selected Areas in Cryptography, 9th Annual International Workshop (SAC 2002), volume 2595 of Lecture Notes in Computer Science, pages 62-75. Springer, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2595 , pp. 62-75
    • Black, J.1    Rogaway, P.2    Shrimpton, T.3
  • 9
    • 33751067991 scopus 로고    scopus 로고
    • A Computationally Sound Mechanized Prover for Security Protocols
    • IEEE Computer Society
    • B. Blanchet. A Computationally Sound Mechanized Prover for Security Protocols. In IEEE Symposium on Security and Privacy (S&P 2006), pages 140-154. IEEE Computer Society, 2006.
    • (2006) IEEE Symposium on Security and Privacy (S&P 2006) , pp. 140-154
    • Blanchet, B.1
  • 13
    • 28144462281 scopus 로고    scopus 로고
    • Universally Composable Security: A New Paradigm for Cryptographic Protocols
    • Technical Report 2000/067, Cryptology ePrint Archive, December 2005. Online available at
    • R. Canetti. Universally Composable Security: A New Paradigm for Cryptographic Protocols. Technical Report 2000/067, Cryptology ePrint Archive, December 2005. Online available at http://eprint.iacr.org/.
    • Canetti, R.1
  • 14
    • 46749100869 scopus 로고    scopus 로고
    • Security and Composition of Cryptographic Protocols: A Tutorial. Cryptology ePrint Archive
    • Report 2006/465, Online available at
    • R. Canetti. Security and Composition of Cryptographic Protocols: A Tutorial. Cryptology ePrint Archive, Report 2006/465, 2006. Online available at http://eprint.iacr.org/.
    • (2006)
    • Canetti, R.1
  • 15
    • 38049064364 scopus 로고    scopus 로고
    • Universally Composable Security with Global Setup
    • Salil P. Vadhan, editor, Theory of Cryptography, 4th Theory of Cryptography Conference, TCC 2007, Proceedings, of, Springer
    • R. Canetti, Y. Dodis, R. Pass, and S. Walfish. Universally Composable Security with Global Setup. In Salil P. Vadhan, editor, Theory of Cryptography, 4th Theory of Cryptography Conference, TCC 2007, Proceedings, volume 4392 of Lecture Notes in Computer Science, pages 61-85. Springer, 2007.
    • (2007) Lecture Notes in Computer Science , vol.4392 , pp. 61-85
    • Canetti, R.1    Dodis, Y.2    Pass, R.3    Walfish, S.4
  • 16
    • 84880897758 scopus 로고    scopus 로고
    • Universally Composable Commitments
    • Joe Kilian, editor, Advances in Cryptology, CRYPTO 2001, 21st Annual International Cryptology Conference, of, Springer
    • R. Canetti and M. Fischlin. Universally Composable Commitments. In Joe Kilian, editor, Advances in Cryptology - CRYPTO 2001, 21st Annual International Cryptology Conference, volume 2139 of Lecture Notes in Computer Science, pages 19-40. Springer, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2139 , pp. 19-40
    • Canetti, R.1    Fischlin, M.2
  • 17
    • 33745528593 scopus 로고    scopus 로고
    • Universally Composable Symbolic Analysis of Mutual Authentication and Key-Exchange Protocols
    • Shai Halevi and Tal Rabin, editors, Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006, Proceedings, of, Springer
    • R. Canetti and J. Herzog. Universally Composable Symbolic Analysis of Mutual Authentication and Key-Exchange Protocols. In Shai Halevi and Tal Rabin, editors, Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006, Proceedings, volume 3876 of Lecture Notes in Computer Science, pages 380-403. Springer, 2006.
    • (2006) Lecture Notes in Computer Science , vol.3876 , pp. 380-403
    • Canetti, R.1    Herzog, J.2
  • 18
    • 84947232363 scopus 로고    scopus 로고
    • Universally Composable Notions of Key Exchange and Secure Channels
    • Lars R. Knudsen, editor, Advances in Cryptology, EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings, of, Springer
    • R. Canetti and H. Krawczyk. Universally Composable Notions of Key Exchange and Secure Channels. In Lars R. Knudsen, editor, Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings, volume 2332 of Lecture Notes in Computer Science, pages 337-351. Springer, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2332 , pp. 337-351
    • Canetti, R.1    Krawczyk, H.2
  • 20
    • 70350534740 scopus 로고    scopus 로고
    • Computational soundness of observational equivalence
    • RR-6508, INRIA, Online available at
    • H. Comon-Lundh and V. Cortier. Computational soundness of observational equivalence. Technical Report INRIA Research Report RR-6508, INRIA, 2008. Online available at http://www.loria.fr/?cortier/Papiers/CCS08-report.pdf.
    • (2008) Technical Report INRIA Research Report
    • Comon-Lundh, H.1    Cortier, V.2
  • 21
    • 33745534937 scopus 로고    scopus 로고
    • Games and the Impossibility of Realizable Ideal Functionality
    • Shai Halevi and Tal Rabin, editors, Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006, Proceedings, of, Springer
    • A. Datta, A. Derek, J. C. Mitchell, A. Ramanathan, and A. Scedrov. Games and the Impossibility of Realizable Ideal Functionality. In Shai Halevi and Tal Rabin, editors, Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006, Proceedings, volume 3876 of Lecture Notes in Computer Science, pages 360-379. Springer, 2006.
    • (2006) Lecture Notes in Computer Science , vol.3876 , pp. 360-379
    • Datta, A.1    Derek, A.2    Mitchell, J.C.3    Ramanathan, A.4    Scedrov, A.5
  • 25
    • 51749119261 scopus 로고    scopus 로고
    • Joint State Theorems for Public-Key Encryption and Digitial Signature Functionalities with Local Computation
    • IEEE Computer Society
    • R. Küsters and M. Tuengerthal. Joint State Theorems for Public-Key Encryption and Digitial Signature Functionalities with Local Computation. In Proceedings of the 21st IEEE Computer Security Foundations Symposium (CSF 2008), pages 270-284. IEEE Computer Society, 2008.
    • (2008) Proceedings of the 21st IEEE Computer Security Foundations Symposium (CSF 2008) , pp. 270-284
    • Küsters, R.1    Tuengerthal, M.2
  • 26
    • 70350552252 scopus 로고    scopus 로고
    • R. Küsters and M. Tuengerthal. Universally Composable Symmetric Encryption. Technical Report 2009/055, Cryp-tology ePrint Archive, 2009. Online available at http://eprint. iacr.org/.
    • R. Küsters and M. Tuengerthal. Universally Composable Symmetric Encryption. Technical Report 2009/055, Cryp-tology ePrint Archive, 2009. Online available at http://eprint. iacr.org/.
  • 27
    • 3543052976 scopus 로고    scopus 로고
    • Symmetric Encryption in Automatic Analyses for Confidentiality against Active Adversaries
    • IEEE Computer Society
    • P. Laud. Symmetric Encryption in Automatic Analyses for Confidentiality against Active Adversaries. In IEEE Symposium on Security and Privacy 2004 (S&P 2004), pages 71-85. IEEE Computer Society, 2004.
    • (2004) IEEE Symposium on Security and Privacy 2004 (S&P 2004) , pp. 71-85
    • Laud, P.1
  • 29
    • 0034823388 scopus 로고    scopus 로고
    • B. Pfitzmann and M. Waidner. A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission. In IEEE Symposium on Security and Privacy 2001 (S&P 2001), pages 184-201. IEEE Computer Society Press, 2001.
    • B. Pfitzmann and M. Waidner. A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission. In IEEE Symposium on Security and Privacy 2001 (S&P 2001), pages 184-201. IEEE Computer Society Press, 2001.
  • 30
    • 38049030237 scopus 로고    scopus 로고
    • Inductive Proofs of Computational Secrecy
    • Joachim Biskup and Javier Lopez, editors, Proceedings of the 12th European Symposium On Research In Computer Security ESORICS 2007, of, Springer
    • A. Roy, A. Datta, A. Derek, and J. C. Mitchell. Inductive Proofs of Computational Secrecy. In Joachim Biskup and Javier Lopez, editors, Proceedings of the 12th European Symposium On Research In Computer Security (ESORICS 2007), volume 4734 of Lecture Notes in Computer Science, pages 219-234. Springer, 2007.
    • (2007) Lecture Notes in Computer Science , vol.4734 , pp. 219-234
    • Roy, A.1    Datta, A.2    Derek, A.3    Mitchell, J.C.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.