19th IEEE Computer Security Foundations Workshop (CSFW'06)
DOI: 10.1109/csfw.2006.9
|View full text |Cite
|
Sign up to set email alerts
|

Computationally Sound Compositional Logic for Key Exchange Protocols

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
67
0

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 49 publications
(68 citation statements)
references
References 28 publications
1
67
0
Order By: Relevance
“…For example, AU T H client kas states that when C finishes executing the Client role, some thread ofK indeed sent the expected message with probability asymptotically close to one; SEC client akey states that the authorization key is "good" after execution of the Client role by C. The other security properties are analogous. More specifically, GoodKeyAgainst(X, k) [27] intuitively means that if k were used instead of a random key to key an IND-CCA encryption scheme, then the advantage of X in the corresponding security game would be negligible. The motivation for using this definition is that stronger conditions such as key indistinguishability fail to hold as soon as the key is used; key indistinguishability is also not necessary to establish reasonable security properties of practical protocols (see [27] for further discussion).…”
Section: Modelling the Protocolmentioning
confidence: 99%
See 4 more Smart Citations
“…For example, AU T H client kas states that when C finishes executing the Client role, some thread ofK indeed sent the expected message with probability asymptotically close to one; SEC client akey states that the authorization key is "good" after execution of the Client role by C. The other security properties are analogous. More specifically, GoodKeyAgainst(X, k) [27] intuitively means that if k were used instead of a random key to key an IND-CCA encryption scheme, then the advantage of X in the corresponding security game would be negligible. The motivation for using this definition is that stronger conditions such as key indistinguishability fail to hold as soon as the key is used; key indistinguishability is also not necessary to establish reasonable security properties of practical protocols (see [27] for further discussion).…”
Section: Modelling the Protocolmentioning
confidence: 99%
“…More specifically, GoodKeyAgainst(X, k) [27] intuitively means that if k were used instead of a random key to key an IND-CCA encryption scheme, then the advantage of X in the corresponding security game would be negligible. The motivation for using this definition is that stronger conditions such as key indistinguishability fail to hold as soon as the key is used; key indistinguishability is also not necessary to establish reasonable security properties of practical protocols (see [27] for further discussion). We abbreviate the honesty assumptions by defining Hon(…”
Section: Modelling the Protocolmentioning
confidence: 99%
See 3 more Smart Citations