Automating computational proofs for public-key-based key exchange


Autoria(s): Ngo, Long; Boyd, Colin; Nieto, Juan Gonzalez
Contribuinte(s)

Faculty of Science and Technology, Information Security Institute

Heng, Swee-Huay

Kurosawa, Kaoru

Data(s)

01/10/2010

Resumo

We present an approach to automating computationally sound proofs of key exchange protocols based on public-key encryption. We show that satisfying the property called occultness in the Dolev-Yao model guarantees the security of a related key exchange protocol in a simple computational model. Security in this simpler model has been shown to imply security in a Bellare {Rogaway-like model. Furthermore, the occultness in the Dolev-Yao model can be searched automatically by a mechanisable procedure. Thus automated proofs for key exchange protocols in the computational model can be achieved. We illustrate the method using the well-known Lowe-Needham-Schroeder protocol.

Formato

application/pdf

Identificador

http://eprints.qut.edu.au/38763/

Publicador

Springer

Relação

http://eprints.qut.edu.au/38763/1/c38763.pdf

http://fist.mmu.edu.my/provsec2010/

Ngo, Long, Boyd, Colin, & Nieto, Juan Gonzalez (2010) Automating computational proofs for public-key-based key exchange. In Heng, Swee-Huay & Kurosawa, Kaoru (Eds.) Provable Security : Proceedings of the 4th International Conference on Provable Security, Springer, Hotel Equatorial Melaka, Malacca, Malaysia, pp. 53-69.

Direitos

Copyright 2010 Springer

This is the author-version of the work. Conference proceedings published, by Springer Verlag, will be available via http://www.springer.de/comp/lncs/

Fonte

Faculty of Science and Technology; Information Security Institute

Palavras-Chave #080303 Computer System Security #Automated #Key exchange #Public key #Computational Soundness
Tipo

Conference Paper