Secrecy of cryptographic protocols under equational theory

被引:8
|
作者
Houmani, H. [1 ]
Mejri, M. [1 ]
Fujita, H. [2 ]
机构
[1] Univ Laval, Ste Foy, PQ G1K 7P4, Canada
[2] Iwate Prefectural Univ, Takizawa, Iwate 0200193, Japan
基金
加拿大自然科学与工程研究理事会;
关键词
Secrecy; Cryptographic protocols; Equational theory; SECURITY PROTOCOLS;
D O I
10.1016/j.knosys.2008.11.004
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper gives a novel approach to verify the secrecy property of cryptographic protocols under equational theories. indeed, by using the notion of interpretation functions, this paper presents some sufficient and practical conditions allowing to guarantee the secrecy property of cryptographic protocols under any equational theory. An interpretation function is a safe means by which an agent can estimate the security level of message components that he receives so that he can handle them correctly. Also, this paper proves that polynomials help a lot with the construction of an interpretation function and gives a guideline on how to construct such functions together with an example and how to use it to analyse a cryptographic protocol. (C) 2008 Elsevier B.V. All rights reserved.
引用
收藏
页码:160 / 173
页数:14
相关论文
共 50 条
  • [21] Deciding knowledge in security protocols under (many more) equational theories
    Abadi, M
    Cortier, W
    18TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2005, : 62 - 76
  • [22] Stateless Cryptographic Protocols
    Goyal, Vipul
    Maji, Hemanta K.
    2011 IEEE 52ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS 2011), 2011, : 678 - 687
  • [23] Cryptography and cryptographic protocols
    Goldreich, O
    DISTRIBUTED COMPUTING, 2003, 16 (2-3) : 177 - 199
  • [24] Programming cryptographic protocols
    Guttman, JD
    Herzog, JC
    Ramsdell, JD
    Sniffen, BT
    TRUSTWORTHY GLOBAL COMPUTING, 2005, 3705 : 116 - 145
  • [25] Cryptographic Secrecy Analysis of Matrix Embedding
    Chen, Jiayong
    Liu, Jiufen
    Zhang, Weiming
    Liu, Huisheng
    Zhao, Xianfeng
    INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 2013, 6 (04) : 639 - 647
  • [26] Cryptographic Secrecy of Steganographic Matrix Embedding
    Regalia, Phillip A.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2008, 3 (04) : 786 - 791
  • [27] Cryptography and cryptographic protocols
    Oded Goldreich
    Distributed Computing, 2003, 16 : 177 - 199
  • [28] Cryptographic secrecy of steganographic matrix encoding
    Chen, J.-Y., 1600, Editorial Board of Journal on Communications (33):
  • [29] On Secrecy Amplification Protocols
    Ostadal, Radim
    Svenda, Petr
    Matyas, Vashek
    INFORMATION SECURITY THEORY AND PRACTICE, WISTP 2015, 2015, 9311 : 3 - 19
  • [30] CRYPTOGRAPHIC SEALING FOR INFORMATION SECRECY AND AUTHENTICATION
    GIFFORD, DK
    COMMUNICATIONS OF THE ACM, 1982, 25 (04) : 274 - 286