2005
DOI: 10.1007/s10207-004-0056-6
|View full text |Cite
|
Sign up to set email alerts
|

Symmetric authentication in a simulatable Dolev–Yao-style cryptographic library

Abstract: Tool-supported proofs of security protocols typically rely on abstractions from real cryptography by term algebras, so-called Dolev-Yao models. However, until recently it was not known whether a Dolev-Yao model could be implemented with real cryptography in a provably secure way under active attacks. For public-key encryption and signatures, this was recently shown, if one accepts a few additions to a typical Dolev-Yao model such as an operation that returns the length of a term.Here we extend this Dolev-Yao-s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2005
2005
2019
2019

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(3 citation statements)
references
References 36 publications
0
3
0
Order By: Relevance
“…Now the grantee (as the "active taker") is the requesting actor (rather than the "passive grantor") and, accordingly, the grantee needs a control privilege of the form [grantor,take] with the control mode take for a positive access decision: For creating, as shown in the lower half of Figure 9.26, there is a control schema create N (creator,creation) for each subset N of the pertinent set of control modes Mode with {take ,grant } Mode. 26 and their effects are visualized in Figure 9.27. 9 For the take/grant/create N class of control schemas, as specified above and visualized in Figure 9.23 and Figure 9.…”
Section: Take-grant and Send-receive Control Schemasmentioning
confidence: 99%
“…Now the grantee (as the "active taker") is the requesting actor (rather than the "passive grantor") and, accordingly, the grantee needs a control privilege of the form [grantor,take] with the control mode take for a positive access decision: For creating, as shown in the lower half of Figure 9.26, there is a control schema create N (creator,creation) for each subset N of the pertinent set of control modes Mode with {take ,grant } Mode. 26 and their effects are visualized in Figure 9.27. 9 For the take/grant/create N class of control schemas, as specified above and visualized in Figure 9.23 and Figure 9.…”
Section: Take-grant and Send-receive Control Schemasmentioning
confidence: 99%
“…The implementation leverages Laud's recent results [17] on secrecy by typing in the context of a simulatable cryptographic library [9,11,12]. Laud has defined a restricted variant of the spi calculus [6] with a fixed scheduling strategy and without channel mobility (so with fixed, global communication ports).…”
Section: Introductionmentioning
confidence: 99%
“…The two works use radically different definitions and approaches. Backes and Pfitzmann employ a simulatability framework based on the cryptographic library of Backes, Pfitzmann, and Waidner [4]. While the initial result was a paper-andpencil proof, subsequent work has come to encompass the use of automated theorem-provers and frameworks backed up by cryptographic soundness guarantees; see [14,16,34,42] for work in this direction.…”
Section: Security Of Nslmentioning
confidence: 99%