In this paper, we extend previous results relating the DolevYao model and the computational model. We add the possibility to exchange keys and consider cryptographic primitives such as signature. This work can be applied to check protocols in the computational model by using automatic verification tools in the formal model. To obtain this result, we introduce a precise definition for security criteria which leads to a nice reduction theorem. The reduction theorem is of interest on its own as it seems to be a powerful tool for proving equivalences between security criteria. Also, the proof of this theorem uses original ideas that seem to be applicable in other situations. © Springer-Verlag Berlin Heidelberg 2005.
CITATION STYLE
Janvier, R., Lakhnech, Y., & Mazaré, L. (2005). Completing the picture: Soundness of formal encryption in the presence of active adversaries. In Lecture Notes in Computer Science (Vol. 3444, pp. 172–185). Springer Verlag. https://doi.org/10.1007/978-3-540-31987-0_13
Mendeley helps you to discover research relevant for your work.