Using a probabilistic polynomial-time process calculus designed for specifying security properties as observational equivalences, we develop a form of bisimulation that justifies an equational proof system. This proof system is sufficiently powerful to derive the semantic security of El Gamal encryption from the Decision Diffie-Hellman (DDH) assumption. The proof system can also derive the converse: if El Gamal is secure, then DDH holds. While these are not new cryptographic results, these example proofs show the power of probabilistic bisimulation and equational reasoning for protocol security. © Springer-Verlag 2004.
CITATION STYLE
Ramanathan, A., Mitchell, J., Scedrov, A., & Teague, V. (2004). Probabilistic bisimulation and equivalence for security analysis of network protocols. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2987, 468–483. https://doi.org/10.1007/978-3-540-24727-2_33
Mendeley helps you to discover research relevant for your work.