메뉴 건너뛰기




Volumn 10, Issue 3, 2011, Pages 611-625

Computationally sound mechanized proofs for deniable authentication protocols with a probabilistic polynomial calculus in computational model

Author keywords

Automatic framework; Computational model; Deniable authentication protocol; Strong deniability; Weak deniability

Indexed keywords

AUTOMATIC FRAMEWORK; COMPUTATIONAL MODEL; DENIABLE AUTHENTICATION PROTOCOL; STRONG DENIABILITY; WEAK DENIABILITY;

EID: 78651373987     PISSN: 18125638     EISSN: 18125646     Source Type: Journal    
DOI: 10.3923/itj.2011.611.625     Document Type: Article
Times cited : (7)

References (32)
  • 5
    • 33749579704 scopus 로고    scopus 로고
    • Automated security proofs with sequences of games
    • Aug. 06, LNCS, Santa Barbara, CA, Springer Verlag
    • Blanchet, B. and D. Pointcheval, 2006. Automated security proofs with sequences of games. Proceedings of the 27th IEEE Symposium on Security, Aug. 06, LNCS, Santa Barbara, CA, Springer Verlag, pp: 537-554.
    • (2006) Proceedings of the 27th IEEE Symposium on Security , pp. 537-554
    • Blanchet, B.1    Pointcheval, D.2
  • 6
    • 0034822279 scopus 로고    scopus 로고
    • An efficient cryptographic protocol verifier based on prolog rules
    • June 11-13, IEEE Computer Society, Washington, DC
    • Blanchet, B., 2001. An efficient cryptographic protocol verifier based on prolog rules. Proceedings of the 14th IEEE Workshop on Computer Security Foundations, June 11-13, IEEE Computer Society, Washington, DC, pp: 82-96.
    • (2001) Proceedings of the 14th IEEE Workshop on Computer Security Foundations , pp. 82-96
    • Blanchet, B.1
  • 8
    • 33751067991 scopus 로고    scopus 로고
    • A computationally sound mechanized prover for security protocols
    • May 21-24, Oakland, California
    • Blanchet, B., 2006. A computationally sound mechanized prover for security protocols. Proceedings of IEEE Symposium on Security and Privacy, May 21-24, Oakland, California, pp: 150-154.
    • (2006) Proceedings of IEEE Symposium on Security and Privacy , pp. 150-154
    • Blanchet, B.1
  • 9
    • 55949087657 scopus 로고    scopus 로고
    • A computationally sound mechanized prover for security protocols
    • Blanchet, B., 2007a. A computationally sound mechanized prover for security protocols. IEEE Trans. Dependable Secure Comput., 5: 193-207.
    • (2007) IEEE Trans. Dependable Secure Comput. , vol.5 , pp. 193-207
    • Blanchet, B.1
  • 10
    • 35048865382 scopus 로고    scopus 로고
    • Computationally sound mechanized proofs of correspondence assertions
    • July 6-8, Venice, Italy
    • Blanchet, B., 2007b. Computationally sound mechanized proofs of correspondence assertions. Proceedings of 20th IEEE Computer Security Foundations Symposium, July 6-8, Venice, Italy, pp: 97-111.
    • (2007) Proceedings of 20th IEEE Computer Security Foundations Symposium , pp. 97-111
    • Blanchet, B.1
  • 13
    • 84947232363 scopus 로고    scopus 로고
    • Universally composable notions of key exchange and secure channels
    • Canetti, R. and H. Krawczyk, 2002. Universally composable notions of key exchange and secure channels. Adv. Cryptol., 2332: 337-351.
    • (2002) Adv. Cryptol. , vol.2332 , pp. 337-351
    • Canetti, R.1    Krawczyk, H.2
  • 16
    • 0037019232 scopus 로고    scopus 로고
    • Deniable authentication protocol based on Diffie-Hellman algorithm
    • Fan, L., C.X. Xu and J.H. Li, 2002. Deniable authentication protocol based on Diffie-Hellman algorithm. Elect. Lett., 38: 705-706.
    • (2002) Elect. Lett. , vol.38 , pp. 705-706
    • Fan, L.1    Xu, C.X.2    Li, J.H.3
  • 17
    • 37349038164 scopus 로고    scopus 로고
    • Universally composable security concurrent deniable authentication based on witness indistinguishable
    • Feng, T. and J.F. Ma, 2007. Universally composable security concurrent deniable authentication based on witness indistinguishable. J. Software, 18: 2871-2881.
    • (2007) J. Software , vol.18 , pp. 2871-2881
    • Feng, T.1    Ma, J.F.2
  • 18
    • 78651377249 scopus 로고    scopus 로고
    • Deniable Authentication protocol resisting man-in-the-middle attack
    • Han, S., W.Q. Liu and E. Chang, 2005. Deniable Authentication protocol resisting man-in-the-middle attack. Proc. World Acad. Sci. Eng. Technol., 3: 161-164.
    • (2005) Proc. World Acad. Sci. Eng. Technol. , vol.3 , pp. 161-164
    • Han, S.1    Liu, W.Q.2    Chang, E.3
  • 21
    • 33845950814 scopus 로고    scopus 로고
    • A novel deniable authentication protocol using generalized ElGamal signature scheme
    • Lee, W.B., C.C. Wu and W.J. Tsaur, 2007. A novel deniable authentication protocol using generalized ElGamal signature scheme. Inform. Sci., 177: 1376-1381.
    • (2007) Inform. Sci. , vol.177 , pp. 1376-1381
    • Lee, W.B.1    Wu, C.C.2    Tsaur, W.J.3
  • 24
    • 26044448602 scopus 로고    scopus 로고
    • A new deniable authentication protocol from bilinear pairings
    • DOI 10.1016/j.amc.2004.09.030, PII S0096300304006538
    • Lu, R. and Z. Cao, 2005a. A new deniable authentication protocol from bilinear pairings. Applied Math. Comput., 168: 954-961. (Pubitemid 41405653)
    • (2005) Applied Mathematics and Computation , vol.168 , Issue.2 , pp. 954-961
    • Lu, R.1    Cao, Z.2
  • 25
    • 14844309431 scopus 로고    scopus 로고
    • Non-interactive deniable authentication protocol based on factoring
    • DOI 10.1016/j.csi.2004.09.007, PII S0920548904001096, Mobile Commerce: A New Frontier in e-Commerce and Wireless Communication
    • Lu, R. and Z. Cao, 2005b. Non-interactive deniable authentication protocol based on factoring. Comput. Standards Interfaces, 27: 401-405. (Pubitemid 40339687)
    • (2005) Computer Standards and Interfaces , vol.27 , Issue.4 , pp. 401-405
    • Lu, R.1    Cao, Z.2
  • 26
    • 62749124406 scopus 로고    scopus 로고
    • A secure non-interactive deniable authentication protocol with strong deniability based on discrete logarithm problem and its application on Internet voting protocol
    • Meng, B., 2009a. A secure non-interactive deniable authentication protocol with strong deniability based on discrete logarithm problem and its application on Internet voting protocol. Inform. Technol. J., 8: 302-309.
    • (2009) Inform. Technol. J. , vol.8 , pp. 302-309
    • Meng, B.1
  • 27
    • 67651065167 scopus 로고    scopus 로고
    • Formalizing deniability
    • Meng, B., 2009b. Formalizing deniability. Inform. Technol. J., 8: 625-642.
    • (2009) Inform. Technol. J. , vol.8 , pp. 625-642
    • Meng, B.1
  • 28
    • 35048899313 scopus 로고    scopus 로고
    • Soundness of formal encryption in the presence of active adversaries
    • Micciancio, D. and B. Warinschi, 2004. Soundness of formal encryption in the presence of active adversaries. Theory Cryptography (LNCS), 2951: 133-151.
    • (2004) Theory Cryptography (LNCS) , vol.2951 , pp. 133-151
    • Micciancio, D.1    Warinschi, B.2
  • 31
    • 2342455866 scopus 로고    scopus 로고
    • Efficient deniable authentication protocol based on generalized ElGamal signature scheme
    • Shao, Z., 2004. Efficient deniable authentication protocol based on generalized ElGamal signature scheme. Comput. Standards Interfaces, 26: 449-454.
    • (2004) Comput. Standards Interfaces , vol.26 , pp. 449-454
    • Shao, Z.1
  • 32
    • 15544375802 scopus 로고    scopus 로고
    • Identity-based deniable authentication protocol
    • Shi, Y. and J. Li, 2005. Identity-based deniable authentication protocol. Elect. Lett., 41: 241-242.
    • (2005) Elect. Lett. , vol.41 , pp. 241-242
    • Shi, Y.1    Li, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.