2015 7th International Conference on Electronics, Computers and Artificial Intelligence (ECAI) 2015
DOI: 10.1109/ecai.2015.7301205
|View full text |Cite
|
Sign up to set email alerts
|

Secrecy by witness-functions under equational theories

Abstract: Abstract-In this paper, we use the witness-functions to analyze cryptographic protocols for secrecy under nonempty equational theories. The witness-functions are safe metrics used to compute security. An analysis with a witness-function consists in making sure that the security of every atomic message does not decrease during its lifecycle in the protocol. The analysis gets more difficult under nonempty equational theories. Indeed, the intruder can take advantage of the algebraic properties of the cryptographi… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2016
2016
2017
2017

Publication Types

Select...
3

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 18 publications
0
2
0
Order By: Relevance
“…An example of algebraic properties may be the homomorphic property [37], [38] where {m 1 .m 2 } k is equivalent to {m 1 } k . {m 2 } k under the equational theory [34], [39], [40].…”
Section: Workmentioning
confidence: 99%
See 1 more Smart Citation
“…An example of algebraic properties may be the homomorphic property [37], [38] where {m 1 .m 2 } k is equivalent to {m 1 } k . {m 2 } k under the equational theory [34], [39], [40].…”
Section: Workmentioning
confidence: 99%
“…In an upcoming work, we are going to give the formal proof of the security properties assured by the proposed protocol using our recent theory called the theory of witness-functions [29]. This theory proposes a series of functions that have been successfully experimented on lots protocols and were powerful either in detecting security flaws or in proving security properties inside cryptographic protocols [30]- [34]. Originally, they were designed to prove secrecy inside protocols by proving that the level of security of every atomic message exchanged in the protocol does not decrease during its life cycle.…”
Section: Workmentioning
confidence: 99%