Symmetric encryption in automatic analyses for confidentiality against active adversaries

被引:0
|
作者
Laud, P [1 ]
机构
[1] Univ Tartu, EE-50090 Tartu, Estonia
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this article we present a technique for static analysis, correct with respect to complexity-theoretic definitions of security, of cryptographic protocols for checking whether these protocols satisfy confidentiality properties. The approach is similar to Abadi and Rogaway - we define patterns for cryptographic protocols (they did it for formal expressions), such that the protocol is secure iff the patterns are. We then statically analyse the patterns, they should be easier to analyse than the protocols themselves. We consider symmetric encryption as the cryptographic primitive in protocols. Handling this primitive has so far received comparatively less attention in approaches striving to unite the formal and computational models of cryptography.
引用
收藏
页码:71 / 85
页数:15
相关论文
共 50 条
  • [1] Soundness of formal encryption in the presence of active adversaries
    Micciancio, D
    Warinschi, B
    [J]. THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2004, 2951 : 133 - 151
  • [2] Encryption Schemes Secure Against Profiling Adversaries
    Diaz-Santiago, Sandra
    Chakraborty, Debrup
    [J]. E-BUSINESS AND TELECOMMUNICATIONS, ICETE 2012, 2014, 455 : 172 - 191
  • [3] Completing the picture:: Soundness of formal encryption in the presence of active adversaries
    Janvier, R
    Lakhnech, Y
    Mazaré, L
    [J]. PROGRAMMING LANGUAGES AND SYSTEMS, PROCEEDINGS, 2005, 3444 : 172 - 185
  • [4] Automatic Proofs of Privacy of Secure Multi-Party Computation Protocols Against Active Adversaries
    Pettai, Martin
    Laud, Peeter
    [J]. 2015 IEEE 28TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM CSF 2015, 2015, : 75 - 89
  • [5] Privacy amplification secure against active adversaries
    Maurer, U
    Wolf, S
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO'97, PROCEEDINGS, 1997, 1294 : 307 - 321
  • [6] RFID KEY ESTABLISHMENT AGAINST ACTIVE ADVERSARIES
    Bringer, J.
    Chabanne, H.
    Cohen, G.
    Kindarji, B.
    [J]. 2009 FIRST IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS), 2009, : 186 - +
  • [7] Private Set Intersection via Searchable Encryption against Malicious Adversaries
    Shao, Zhi-yi
    Yang, Bo
    [J]. MODERN TECHNOLOGIES IN MATERIALS, MECHANICS AND INTELLIGENT SYSTEMS, 2014, 1049 : 1812 - 1819
  • [8] Classifier evaluation and attribute selection against active adversaries
    Murat Kantarcıoğlu
    Bowei Xi
    Chris Clifton
    [J]. Data Mining and Knowledge Discovery, 2011, 22 : 291 - 335
  • [9] Classifier evaluation and attribute selection against active adversaries
    Kantarcioglu, Murat
    Xi, Bowei
    Clifton, Chris
    [J]. DATA MINING AND KNOWLEDGE DISCOVERY, 2011, 22 (1-2) : 291 - 335
  • [10] On the Security of Symmetric Encryption Against Mass Surveillance
    Sun, Da-Zhi
    Mu, Yi
    [J]. IEEE ACCESS, 2020, 8 (08): : 175625 - 175636