2013
DOI: 10.1007/978-3-642-36594-2_30
|View full text |Cite
|
Sign up to set email alerts
|

Computational Soundness of Coinductive Symbolic Security under Active Attacks

Abstract: Abstract. In Eurocrypt 2010, Miccinacio initiated an investigation of cryptographically sound, symbolic security analysis with respect to coinductive adversarial knowledge, and demonstrated that under an adversarially passive model, certain security criteria (e.g. indistinguishability) may be given a computationally sound symbolic characterization, without the assumption of key acyclicity. Left open in his work was the fundamental question of "the viability of extending the coinductive approach to prove comput… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 47 publications
0
1
0
Order By: Relevance
“…Anonymity can be expressed as single entity's unidentification in the set of entities, so a suitable method for the study of anonymity is observational equivalence . Equivalent traces were presented firstly in the paper , and the paper also made use of equivalent traces to analyze anonymity of protocols.…”
Section: Introductionmentioning
confidence: 99%
“…Anonymity can be expressed as single entity's unidentification in the set of entities, so a suitable method for the study of anonymity is observational equivalence . Equivalent traces were presented firstly in the paper , and the paper also made use of equivalent traces to analyze anonymity of protocols.…”
Section: Introductionmentioning
confidence: 99%