Results 1 -
2 of
2
Computational soundness of non-malleable commitments
- In Proc. 4th Information Security Practice and Experience Conference (ISPEC’08), LNCS
, 2008
"... The following full text is an author's version which may differ from the publisher's version. For additional information about this publication click this link. ..."
Abstract
-
Cited by 6 (0 self)
- Add to MetaCart
The following full text is an author's version which may differ from the publisher's version. For additional information about this publication click this link.
Rank Functions Based Inference System for Group Key Management Protocols Verification
, 2007
"... Design and verification of cryptographic protocols has been under investigation for quite sometime. However, most of the attention has been paid for two parties protocols. In group key management and distribution protocols, keys are computed dynamically through cooperation of all protocol participan ..."
Abstract
-
Cited by 4 (2 self)
- Add to MetaCart
(Show Context)
Design and verification of cryptographic protocols has been under investigation for quite sometime. However, most of the attention has been paid for two parties protocols. In group key management and distribution protocols, keys are computed dynamically through cooperation of all protocol participants. Therefore regular approaches for two parties protocols verification cannot be applied on group key protocols. In this paper, we present a framework for formally verifying of group key management and distribution protocols based on the concept of rank functions. We define a class of rank functions that satisfy specific requirements and prove the soundness of these rank functions. Based on the set of sound rank functions, we provide a sound and complete inference system to detect attacks in group key management protocols. The inference system provides an elegant and natural proof strategy for such protocols compared to existing approaches. The above formalizations and rank theorems were implemented using the Prototype Verification System (PVS) theorem prover. We illustrate our approach by applying the inference system on a generic Diffie-Hellman group protocol and prove it in PVS.