2007
DOI: 10.1007/978-3-540-74835-9_15
|View full text |Cite
|
Sign up to set email alerts
|

Inductive Proofs of Computational Secrecy

Abstract: Abstract. Secrecy properties of network protocols assert that no probabilistic polynomial-time distinguisher can win a suitable game presented by a challenger. Because such properties are not determined by traceby-trace behavior of the protocol, we establish a trace-based protocol condition, suitable for inductive proofs, that guarantees a generic reduction from protocol attacks to attacks on underlying primitives. We use this condition to present a compositional inductive proof system for secrecy, and illustr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
37
0

Year Published

2007
2007
2008
2008

Publication Types

Select...
5

Relationship

3
2

Authors

Journals

citations
Cited by 15 publications
(37 citation statements)
references
References 30 publications
0
37
0
Order By: Relevance
“…In addition, the present soundness proofs are based on a new cryptographic definition and associated theorems about the joint security of multiple encryption schemes keyed using random or DHKE-keys. This paper complements [39] and completes the development of formal cryptographically sound proofs for three modes of Kerberos V5 ( [42] contains technical details).…”
Section: Introductionmentioning
confidence: 62%
See 4 more Smart Citations
“…In addition, the present soundness proofs are based on a new cryptographic definition and associated theorems about the joint security of multiple encryption schemes keyed using random or DHKE-keys. This paper complements [39] and completes the development of formal cryptographically sound proofs for three modes of Kerberos V5 ( [42] contains technical details).…”
Section: Introductionmentioning
confidence: 62%
“…Section 3.2 summarizes the concept of secretive protocol and proof rules taken from [39] that are used in this paper to establish secrecy properties. However, we give new soundness proofs for these axioms, based on an extension of standard multiparty encryption schemes [10] to allow for multiple public and symmetric encryption schemes keyed using random or Diffie-Hellman based keys.…”
Section: Proof Systemmentioning
confidence: 99%
See 3 more Smart Citations