Completing the picture: Soundness of formal encryption in the presence of active adversaries

44Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

In this paper, we extend previous results relating the DolevYao model and the computational model. We add the possibility to exchange keys and consider cryptographic primitives such as signature. This work can be applied to check protocols in the computational model by using automatic verification tools in the formal model. To obtain this result, we introduce a precise definition for security criteria which leads to a nice reduction theorem. The reduction theorem is of interest on its own as it seems to be a powerful tool for proving equivalences between security criteria. Also, the proof of this theorem uses original ideas that seem to be applicable in other situations. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Janvier, R., Lakhnech, Y., & Mazaré, L. (2005). Completing the picture: Soundness of formal encryption in the presence of active adversaries. In Lecture Notes in Computer Science (Vol. 3444, pp. 172–185). Springer Verlag. https://doi.org/10.1007/978-3-540-31987-0_13

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free