메뉴 건너뛰기




Volumn 6247 LNCS, Issue , 2010, Pages 1-18

Degrees of security: Protocol guarantees in the face of compromising adversaries

Author keywords

[No Author keywords available]

Indexed keywords

ADVERSARY MODELS; CRYPTOGRAPHIC PROTOCOLS; KEY-COMPROMISE IMPERSONATION; OPERATIONAL SEMANTICS; PERFECT FORWARD SECRECY; PROTOCOL ANALYSIS; RELATIVE STRENGTH;

EID: 77956596618     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-15205-4_1     Document Type: Conference Paper
Times cited : (13)

References (25)
  • 1
    • 84969368443 scopus 로고
    • An identity-based key-exchange protocol
    • Quisquater, J.-J., Vandewalle, J. (eds.) EUROCRYPT 1989, Springer, Heidelberg
    • Günther, C.: An identity-based key-exchange protocol. In: Quisquater, J.-J., Vandewalle, J. (eds.) EUROCRYPT 1989. LNCS, vol.434, pp. 29-37. Springer, Heidelberg (1990)
    • (1990) LNCS , vol.434 , pp. 29-37
    • Günther, C.1
  • 3
    • 77956569636 scopus 로고    scopus 로고
    • From Dolev-Yao to strong adaptive corruption: Analyzing security in the presence of compromising adversaries
    • Basin, D., Cremers, C.: From Dolev-Yao to strong adaptive corruption: Analyzing security in the presence of compromising adversaries. Cryptology ePrint Archive, Report 2009/079 (2009), http://eprint.iacr.org/
    • (2009) Cryptology EPrint Archive, Report 2009/079
    • Basin, D.1    Cremers, C.2
  • 4
    • 35048860626 scopus 로고    scopus 로고
    • Analysis of key-exchange protocols and their use for building secure channels
    • Pfitzmann, B. (ed.) EUROCRYPT 2001, Springer, Heidelberg
    • Canetti, R., Krawczyk, H.: Analysis of key-exchange protocols and their use for building secure channels. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol.2045, pp. 453-474. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2045 , pp. 453-474
    • Canetti, R.1    Krawczyk, H.2
  • 5
    • 38149012093 scopus 로고    scopus 로고
    • Stronger security of authenticated key exchange
    • Susilo, W., Liu, J.K., Mu, Y. (eds.) ProvSec 2007, Springer, Heidelberg
    • LaMacchia, B., Lauter, K., Mityagin, A.: Stronger security of authenticated key exchange. In: Susilo, W., Liu, J.K., Mu, Y. (eds.) ProvSec 2007. LNCS, vol.4784, pp. 1-16. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4784 , pp. 1-16
    • Lamacchia, B.1    Lauter, K.2    Mityagin, A.3
  • 6
    • 0004023090 scopus 로고    scopus 로고
    • (version 4) (November, revision of IBM Research Report RZ 3120 (April 1999)
    • Shoup, V.: On formal models for secure key exchange (version 4) (November 1999); revision of IBM Research Report RZ 3120 (April 1999)
    • (1999) On Formal Models for Secure Key Exchange
    • Shoup, V.1
  • 7
    • 77952356149 scopus 로고    scopus 로고
    • Securing group key exchange against strong corruptions
    • ACM, New York
    • Bresson, E., Manulis, M.: Securing group key exchange against strong corruptions. In: ASIACCS, pp. 249-260. ACM, New York (2008)
    • (2008) ASIACCS , pp. 249-260
    • Bresson, E.1    Manulis, M.2
  • 8
    • 84955559079 scopus 로고    scopus 로고
    • Authenticated multi-party key agreement
    • Kim, K.-c., Matsumoto, T. (eds.) ASIACRYPT 1996, Springer, Heidelberg
    • Just, M., Vaudenay, S.: Authenticated multi-party key agreement. In: Kim, K.-c., Matsumoto, T. (eds.) ASIACRYPT 1996. LNCS, vol.1163, pp. 36-49. Springer, Heidelberg (1996)
    • (1996) LNCS , vol.1163 , pp. 36-49
    • Just, M.1    Vaudenay, S.2
  • 10
    • 0001940580 scopus 로고
    • Provably secure session key distribution: The three party case
    • ACM, New York
    • Bellare, M., Rogaway, P.: Provably secure session key distribution: the three party case. In: Proc. STOC 1995, pp. 57-66. ACM, New York (1995)
    • (1995) Proc. STOC 1995 , pp. 57-66
    • Bellare, M.1    Rogaway, P.2
  • 11
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated key exchange secure against dictionary attacks
    • Preneel, B. (ed.) EUROCRYPT 2000, Springer, Heidelberg
    • Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated key exchange secure against dictionary attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.1807, pp. 139-155. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1807 , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 12
    • 84945119254 scopus 로고
    • Entity authentication and key distribution
    • Stinson, D.R. (ed.) CRYPTO 1993, Springer, Heidelberg
    • Bellare, M., Rogaway, P.: Entity authentication and key distribution. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol.773, pp. 232-249. Springer, Heidelberg (1994)
    • (1994) LNCS , vol.773 , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 14
    • 48949088211 scopus 로고    scopus 로고
    • The Scyther Tool: Verification, falsification, and analysis of security protocols
    • Gupta, A., Malik, S. (eds.) CAV 2008, Springer, Heidelberg
    • Cremers, C.: The Scyther Tool: Verification, falsification, and analysis of security protocols. In: Gupta, A., Malik, S. (eds.) CAV 2008. LNCS, vol.5123, pp. 414-418. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5123 , pp. 414-418
    • Cremers, C.1
  • 15
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the needham-schroeder public-key protocol using FDR
    • Tools and Algorithms for the Construction and Analysis of Systems
    • Lowe, G.: Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In: Margaria, T., Steffen, B. (eds.) TACAS 1996. LNCS, vol.1055, pp. 147-166. Springer, Heidelberg (1996) (Pubitemid 126050413)
    • (1996) Lecture Notes in Computer Science , Issue.1055 , pp. 147-166
    • Lowe, G.1
  • 16
    • 33750487822 scopus 로고    scopus 로고
    • Injective synchronisation: An extension of the authentication hierarchy
    • Cremers, C., Mauw, S., de Vink, E.: Injective synchronisation: an extension of the authentication hierarchy. Theoretical Computer Science, 139-161 (2006)
    • (2006) Theoretical Computer Science , pp. 139-161
    • Cremers, C.1    Mauw, S.2    De Vink, E.3
  • 18
    • 67650240831 scopus 로고    scopus 로고
    • Unbounded verification, falsification, and characterization of security protocols by pattern refinement
    • ACM, New York
    • Cremers, C.: Unbounded verification, falsification, and characterization of security protocols by pattern refinement. In: CCS 2008: Proc. of the 15th ACM conference on Computer and communications security, pp. 119-128. ACM, New York (2008)
    • (2008) CCS 2008: Proc. of the 15th ACM Conference on Computer and Communications Security , pp. 119-128
    • Cremers, C.1
  • 20
    • 31844437459 scopus 로고    scopus 로고
    • Towards computationally sound symbolic analysis of key exchange protocols
    • ACM, New York
    • Gupta, P., Shmatikov, V.: Towards computationally sound symbolic analysis of key exchange protocols. In: Proc. FMSE 2005, pp. 23-32. ACM, New York (2005)
    • (2005) Proc. FMSE 2005 , pp. 23-32
    • Gupta, P.1    Shmatikov, V.2
  • 21
    • 35048878818 scopus 로고    scopus 로고
    • One-round protocols for two-party authenticated key exchange
    • Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004, Springer, Heidelberg
    • Jeong, I.R., Katz, J., Lee, D.H.: One-round protocols for two-party authenticated key exchange. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, vol.3089, pp. 220-232. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3089 , pp. 220-232
    • Jeong, I.R.1    Katz, J.2    Lee, D.H.3
  • 23
    • 77954616596 scopus 로고    scopus 로고
    • One-round key exchange in the standard model
    • Boyd, C., Cliff, Y., Nieto, J.M.G., Paterson, K.G.: One-round key exchange in the standard model. IJACT 1(3), 181-199 (2009)
    • (2009) IJACT , vol.1 , Issue.3 , pp. 181-199
    • Boyd, C.1    Cliff, Y.2    Nieto, J.M.G.3    Paterson, K.G.4
  • 24
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • Needham, R., Schroeder, M.: Using encryption for authentication in large networks of computers. Communications of the ACM 21(12), 993-999 (1978)
    • (1978) Communications of the ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.1    Schroeder, M.2
  • 25
    • 77956577809 scopus 로고
    • CCITT: The directory authentification framework, Version 7
    • CCITT: The directory authentification framework, Draft Recommendation X.509, Version 7 (1987)
    • (1987) Draft Recommendation X.509


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.