Automating computational proofs for public-key-based key exchange
Contribuinte(s) |
Faculty of Science and Technology, Information Security Institute Heng, Swee-Huay Kurosawa, Kaoru |
---|---|
Data(s) |
01/10/2010
|
Resumo |
We present an approach to automating computationally sound proofs of key exchange protocols based on public-key encryption. We show that satisfying the property called occultness in the Dolev-Yao model guarantees the security of a related key exchange protocol in a simple computational model. Security in this simpler model has been shown to imply security in a Bellare {Rogaway-like model. Furthermore, the occultness in the Dolev-Yao model can be searched automatically by a mechanisable procedure. Thus automated proofs for key exchange protocols in the computational model can be achieved. We illustrate the method using the well-known Lowe-Needham-Schroeder protocol. |
Formato |
application/pdf |
Identificador | |
Publicador |
Springer |
Relação |
http://eprints.qut.edu.au/38763/1/c38763.pdf http://fist.mmu.edu.my/provsec2010/ Ngo, Long, Boyd, Colin, & Nieto, Juan Gonzalez (2010) Automating computational proofs for public-key-based key exchange. In Heng, Swee-Huay & Kurosawa, Kaoru (Eds.) Provable Security : Proceedings of the 4th International Conference on Provable Security, Springer, Hotel Equatorial Melaka, Malacca, Malaysia, pp. 53-69. |
Direitos |
Copyright 2010 Springer This is the author-version of the work. Conference proceedings published, by Springer Verlag, will be available via http://www.springer.de/comp/lncs/ |
Fonte |
Faculty of Science and Technology; Information Security Institute |
Palavras-Chave | #080303 Computer System Security #Automated #Key exchange #Public key #Computational Soundness |
Tipo |
Conference Paper |