메뉴 건너뛰기




Volumn 12, Issue 4, 2013, Pages 267-297

Less is more: Relaxed yet composable security notions for key exchange

Author keywords

Key agreement; TLS

Indexed keywords

KEY AGREEMENT; KEY AGREEMENT PROTOCOL; KEY EXCHANGE PROTOCOLS; MONOLITHIC ANALYSIS; SECURITY DEFINITIONS; SECURITY NOTION; SECURITY REQUIREMENTS; TLS;

EID: 84880165237     PISSN: 16155262     EISSN: 16155270     Source Type: Journal    
DOI: 10.1007/s10207-013-0192-y     Document Type: Article
Times cited : (28)

References (30)
  • 2
    • 84948957152 scopus 로고    scopus 로고
    • Public-key encryption in a multi-user setting: Security proofs and improvements
    • LNCS,Springer
    • Bellare, M., Boldyreva, A., Micali, S.: Public-key encryption in a multi-user setting: security proofs and improvements. In: Advances in Cryptology-EUROCRYPT 2000, LNCS, vol. 1807, pp. 259-274, Springer (2000).
    • (2000) Advances in Cryptology-EUROCRYPT 2000 , vol.1807 , pp. 259-274
    • Bellare, M.1    Boldyreva, A.2    Micali, S.3
  • 3
    • 35048832490 scopus 로고    scopus 로고
    • An uninstantiable random-oracle-model scheme for a hybrid-encryption problem
    • LNCS,Springer
    • Bellare, M., Boldyreva, A., Palacio, A.: An uninstantiable random-oracle-model scheme for a hybrid-encryption problem. In: Advances in Cryptology-EUROCRYPT 2004, LNCS, vol. 3027, pp. 171-188, Springer (2004).
    • (2004) Advances in Cryptology-EUROCRYPT 2004 , vol.3027 , pp. 171-188
    • Bellare, M.1    Boldyreva, A.2    Palacio, A.3
  • 4
    • 84937407719 scopus 로고    scopus 로고
    • Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
    • LNCS,Springer
    • Bellare, M., Namprempre, C.: Authenticated encryption: relations among notions and analysis of the generic composition paradigm. In: Advances in Cryptology-ASIACRYPT 2000, LNCS, vol. 1976, pp. 531-545, Springer (2000).
    • (2000) Advances in Cryptology-ASIACRYPT 2000 , vol.1976 , pp. 531-545
    • Bellare, M.1    Namprempre, C.2
  • 5
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated key exchange secure against dictionary attacks
    • LNCS,Springer
    • Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated key exchange secure against dictionary attacks. In: Advances in Cryptology-EUROCRYPT 2000, LNCS, vol. 1807, pp. 139-155, Springer (2000).
    • (2000) Advances in Cryptology-EUROCRYPT 2000 , vol.1807 , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 6
    • 84945119254 scopus 로고
    • Entity authentication and key distribution
    • LNCS,Springer
    • Bellare, M., Rogaway, P.: Entity authentication and key distribution. In: Advances in Cryptology, CRYPTO '93, LNCS, vol. 773, pp. 232-249, Springer (1994).
    • (1994) Advances in Cryptology, CRYPTO '93 , vol.773 , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 9
    • 84957001208 scopus 로고    scopus 로고
    • Entity authentication and authenticated key transport protocols employing asymmetric techniques
    • LNCS,Springer
    • Blake-Wilson, S., Menezes, A. J.: Entity authentication and authenticated key transport protocols employing asymmetric techniques. In: IWSP, LNCS, vol. 1361, pp. 137-158, Springer (1998).
    • (1998) IWSP , vol.1361 , pp. 137-158
    • Blake-Wilson, S.1    Menezes, A.J.2
  • 10
    • 84957693225 scopus 로고    scopus 로고
    • Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS
    • LNCS,Springer
    • Bleichenbacher, D.: Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS #1. In: Advances in Cryptology-CRYPTO '98, LNCS, vol. 1462, pp. 1-12, Springer (1998).
    • (1998) Advances in Cryptology-CRYPTO '98 , vol.1462 , pp. 1-12
    • Bleichenbacher, D.1
  • 12
    • 0000731055 scopus 로고    scopus 로고
    • Security and composition of multiparty cryptographic protocols
    • Canetti, R.: Security and composition of multiparty cryptographic protocols. J. Cryptol. 13, 143-202 (2000).
    • (2000) J. Cryptol , vol.13 , pp. 143-202
    • Canetti, R.1
  • 13
    • 35048860626 scopus 로고    scopus 로고
    • Analysis of key-exchange protocols and their use for building secure channels
    • LNCS,Springer
    • Canetti, R., Krawczyk, H.: Analysis of key-exchange protocols and their use for building secure channels. In: Advances in Cryptology-EUROCRYPT 2001, LNCS, vol. 2045, pp. 453-474, Springer (2001).
    • (2001) Advances in Cryptology-EUROCRYPT 2001 , vol.2045 , pp. 453-474
    • Canetti, R.1    Krawczyk, H.2
  • 14
    • 84947232363 scopus 로고    scopus 로고
    • Universally composable notions of key exchange and secure channels
    • LNCS,Springer
    • Canetti, R., Krawczyk, H.: Universally composable notions of key exchange and secure channels. In: Advances in Cryptology-EUROCRYPT 2002, LNCS, vol. 2332, pp. 337-351, Springer (2002).
    • (2002) Advances in Cryptology-EUROCRYPT 2002 , vol.2332 , pp. 337-351
    • Canetti, R.1    Krawczyk, H.2
  • 15
    • 84869635960 scopus 로고    scopus 로고
    • Security analysis of IKE's signature-based key-exchange protocol
    • LNCS,Springer
    • Canetti, R., Krawczyk, H.: Security analysis of IKE's signature-based key-exchange protocol. In: Advances in Cryptology-CRYPTO 2002, LNCS, vol. 2442, pp. 143-161, Springer (2002).
    • (2002) Advances in Cryptology-CRYPTO 2002 , vol.2442 , pp. 143-161
    • Canetti, R.1    Krawczyk, H.2
  • 16
    • 35248819315 scopus 로고    scopus 로고
    • Universal composition with joint state
    • LNCS,Springer
    • Canetti, R., Rabin, T.: Universal composition with joint state. In: Advances in Cryptology-CRYPTO 2003, LNCS, vol. 2729, pp. 265-281, Springer (2003).
    • (2003) Advances in Cryptology-CRYPTO 2003 , vol.2729 , pp. 265-281
    • Canetti, R.1    Rabin, T.2
  • 19
    • 84880142969 scopus 로고    scopus 로고
    • The TLS Protocol Version 1. 2. RFC 4346, April
    • Dierks, T., Allen, C.: The TLS Protocol Version 1. 2. RFC 4346, April (2006).
    • (2006)
    • Dierks, T.1    Allen, C.2
  • 21
    • 0023985465 scopus 로고
    • A digiral signature scheme secure against adaptive chosen-message attacks
    • Goldwasser, S., Micali, S., Rivest, R.: A digiral signature scheme secure against adaptive chosen-message attacks. SIAM J. Comput. 17, 281-308 (1988).
    • (1988) SIAM J. Comput , vol.17 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.3
  • 22
    • 79953664102 scopus 로고    scopus 로고
    • International Civic Aviation Organization. Version 1. 01. Available at
    • International Civic Aviation Organization. Supplemental Access Control for Machine Readable Travel Documents. Version 1. 01. Available at http://www2. icao. int/en/MRTD/Downloads/TechnicalReports/TechnicalReport. pdf. (2010).
    • (2010) Supplemental Access Control for Machine Readable Travel Documents
  • 24
    • 84880174218 scopus 로고    scopus 로고
    • PKCS #1: RSA Encryption Version 1. 5. RFC 2313, October
    • Kaliski, B.: PKCS #1: RSA Encryption Version 1. 5. RFC 2313, October (1998).
    • (1998)
    • Kaliski, B.1
  • 27
    • 78649995406 scopus 로고    scopus 로고
    • On the soundness of authenticate-then-encrypt: Formalizing the malleability of symmetric encryption
    • ACM
    • Maurer, U., Tackmann, B.: On the soundness of authenticate-then-encrypt: formalizing the malleability of symmetric encryption. In: Conference on Computer and Communication Security-CCS 2010, pp. 505-515, ACM (2010).
    • (2010) Conference on Computer and Communication Security-CCS 2010 , pp. 505-515
    • Maurer, U.1    Tackmann, B.2
  • 28
    • 73849111632 scopus 로고    scopus 로고
    • The TLS handshake protocol: a modular analysis
    • Morrissey, P., Smart, N. P., Warinschi, B.: The TLS handshake protocol: a modular analysis. J. Cryptol. 23, 187-223 (2010).
    • (2010) J. Cryptol , vol.23 , pp. 187-223
    • Morrissey, P.1    Smart, N.P.2    Warinschi, B.3
  • 29
    • 82955189836 scopus 로고    scopus 로고
    • Tag size boes matter: Attacks and proofs for the TLS record protocol
    • LNCS,Springer
    • Paterson, K. G., Ristenpart, T., Shrimpton, T.: Tag size boes matter: attacks and proofs for the TLS record protocol. In: Advances in Cryptology-ASIACRYPT 2011, LNCS, vol. 7073, pp. 372-389, Springer (2011).
    • (2011) Advances in Cryptology-ASIACRYPT 2011 , vol.7073 , pp. 372-389
    • Paterson, K.G.1    Ristenpart, T.2    Shrimpton, T.3
  • 30
    • 3042666549 scopus 로고    scopus 로고
    • On formal models for secure key exchange
    • Shoup, V: On formal models for secure key exchange. IBM Research Report RZ 3120 (1999).
    • (1999) IBM Research Report RZ , vol.3120
    • Shoup, V.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.