Proceedings of the 18th ACM Conference on Computer and Communications Security 2011
DOI: 10.1145/2046707.2046715
|View full text |Cite
|
Sign up to set email alerts
|

Composition theorems without pre-established session identifiers

Abstract: Abstract. Canetti's universal composition theorem and the joint state composition theorems by Canetti and Rabin are useful and widely employed tools for the modular design and analysis of cryptographic protocols. However, these theorems assume that parties participating in a protocol session have pre-established a unique session ID (SID). While the use of such SIDs is a good design principle, existing protocols, in particular real-world security protocols, typically do not use pre-established SIDs, at least no… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
40
0

Year Published

2012
2012
2024
2024

Publication Types

Select...
8
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 30 publications
(40 citation statements)
references
References 26 publications
0
40
0
Order By: Relevance
“…Küsters and Tuengerthal [41] claim to prove composable security for TLS assuming only local session identifiers, but leave out all details of the proof and only point to [33].…”
Section: Related Workmentioning
confidence: 99%
“…Küsters and Tuengerthal [41] claim to prove composable security for TLS assuming only local session identifiers, but leave out all details of the proof and only point to [33].…”
Section: Related Workmentioning
confidence: 99%
“…Gajek et al [25] outline a proof of security of TLS in the simulation-based model of [14]. However, Küsters and Tuengerthal [42] correctly note that their (ab)use of a crucial theorem to obtain multi-session security relies on pre-established identifiers not available in TLS, and suggest a framework for overcoming this limitation.…”
Section: Prior Security Results On the Tls Handshakementioning
confidence: 99%
“…Universal composability (UC) [17,18,20,32] is a framework that allows to compose protocols. However, proving UC-security requires stronger properties than the game-based framework that we use ( [16, Appendix A] details limitations of the UC framework).…”
Section: Rr N°9171mentioning
confidence: 99%