Provable security for cryptographic protocols - Exact analysis and engineering applications

被引:2
|
作者
Gray, JW
Ip, KFE
Lui, KS
机构
关键词
D O I
10.1109/CSFW.1997.596784
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We develop an approach to deriving concrete engineering advice for cryptographic protocols from provable-security-style proofs of security. The approach is illustrated with a simple, yet useful protocol. The proof is novel and is the first published proof that provides an exact relationship between a high-level protocol and multiple cryptographic primitives.
引用
收藏
页码:45 / 58
页数:14
相关论文
共 50 条
  • [1] Provable cryptographic security and its applications to mobile wireless computing
    Gentry, C
    Ramzan, Z
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2004, 29 (3-4) : 191 - 203
  • [2] Provable Cryptographic Security and its Applications to Mobile Wireless Computing
    Craig Gentry
    Zulfikar Ramzan
    [J]. Wireless Personal Communications, 2004, 29 : 191 - 203
  • [3] Domain Engineering for Automatic Analysis of Financial Applications of Cryptographic Protocols
    Georgieva, Lilia
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2010, 6052 : 428 - 428
  • [4] Provable implementations of security protocols
    Gordon, Andrew D.
    [J]. 21ST ANNUAL IEEE SYMPOSIUM ON LOGIC IN COMPUTER SCIENCE, PROCEEDINGS, 2006, : 345 - 346
  • [5] Algebra model and security analysis for cryptographic protocols
    HUAI Jinpeng & LI Xianxian School of Computer
    [J]. Science China(Information Sciences), 2004, (02) : 199 - 220
  • [6] Algebra model and security analysis for cryptographic protocols
    Huai, JP
    Li, XX
    [J]. SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2004, 47 (02): : 199 - 220
  • [7] Algebra model and security analysis for cryptographic protocols
    Jinpeng Huai
    Xianxian Li
    [J]. Science in China Series F: Information Sciences, 2004, 47 : 199 - 220
  • [8] What Does Provable Security Mean for Cryptographic Schemes?
    Pointchevalcisional, David
    [J]. COMMUNICATIONS OF THE ACM, 2023, 66 (06) : 106 - 106
  • [9] A Review on Cryptographic Techniques and Security Protocols over Instant Messaging Applications
    Nazir, Nosheen
    Malik, Muhammad Sheraz Arshad
    Shoukat, Ijaz
    Mehboob, Javeria
    Yousaf, Aliya
    Naseem, Samina
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2018, 18 (08): : 93 - 97
  • [10] Analysis of security requirements for cryptographic voting protocols (extended abstract)
    Cetinkaya, Orhan
    [J]. ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 1451 - 1456