2017 IEEE International Conference on Systems, Man, and Cybernetics (SMC) 2017
DOI: 10.1109/smc.2017.8123025
|View full text |Cite
|
Sign up to set email alerts
|

Witness-functions versus interpretation-functions for secrecy in cryptographic protocols: What to choose?

Abstract: Abstract-Proving that a cryptographic protocol is correct for secrecy is a hard task. One of the strongest strategies to reach this goal is to show that it is increasing, which means that the security level of every single atomic message exchanged in the protocol, safely evaluated, never deceases. Recently, two families of functions have been proposed to measure the security level of atomic messages. The first one is the family of interpretationfunctions. The second is the family of witness-functions. In this … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 13 publications
0
2
0
Order By: Relevance
“…Witness functions, using the general theorem or the little one, are beginning to gain ground and are proven to be a powerful means of detecting security breaches or designing correct protocols. They have outperformed other analytical tools and methods such as interpretation functions [22], [23] in terms of efficiency and accuracy [12]. The fact that these functions allow a static analysis saves a lot of effort and time compared to other dynamic methods based on Model-Checking [24] or on program logics [25], for example.…”
Section: Comparison With Related Workmentioning
confidence: 99%
“…Witness functions, using the general theorem or the little one, are beginning to gain ground and are proven to be a powerful means of detecting security breaches or designing correct protocols. They have outperformed other analytical tools and methods such as interpretation functions [22], [23] in terms of efficiency and accuracy [12]. The fact that these functions allow a static analysis saves a lot of effort and time compared to other dynamic methods based on Model-Checking [24] or on program logics [25], for example.…”
Section: Comparison With Related Workmentioning
confidence: 99%
“…Also, encrypted messages are much larger than those encrypted using symmetric keys. Cryptographic protocols, using symmetric or asymmetric cryptographic algorithms, [3], [4], [5], [6] are rules of exchange between network points whose role is precisely to secure communications. They are used for example in e-commerce, when a customer enters his credit card number to pay for a purchase.…”
Section: Introductionmentioning
confidence: 99%