• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

Computationally sound analysis of protocols using bilinear pairings (2007)

by Maz07 Laurent Mazaré
Venue:In WITS’07
Add To MetaCart

Tools

Sorted by:
Results 1 - 2 of 2

Computational soundness of non-malleable commitments

by David Galindo, Flavio D. Garcia, Peter Van Rossum - In Proc. 4th Information Security Practice and Experience Conference (ISPEC’08), LNCS , 2008
"... The following full text is an author's version which may differ from the publisher's version. For additional information about this publication click this link. ..."
Abstract - Cited by 6 (0 self) - Add to MetaCart
The following full text is an author's version which may differ from the publisher's version. For additional information about this publication click this link.

Rank Functions Based Inference System for Group Key Management Protocols Verification

by Amjad Gawanmeh, Adel Bouhoula, Sofiène Tahar , 2007
"... Design and verification of cryptographic protocols has been under investigation for quite sometime. However, most of the attention has been paid for two parties protocols. In group key management and distribution protocols, keys are computed dynamically through cooperation of all protocol participan ..."
Abstract - Cited by 4 (2 self) - Add to MetaCart
Design and verification of cryptographic protocols has been under investigation for quite sometime. However, most of the attention has been paid for two parties protocols. In group key management and distribution protocols, keys are computed dynamically through cooperation of all protocol participants. Therefore regular approaches for two parties protocols verification cannot be applied on group key protocols. In this paper, we present a framework for formally verifying of group key management and distribution protocols based on the concept of rank functions. We define a class of rank functions that satisfy specific requirements and prove the soundness of these rank functions. Based on the set of sound rank functions, we provide a sound and complete inference system to detect attacks in group key management protocols. The inference system provides an elegant and natural proof strategy for such protocols compared to existing approaches. The above formalizations and rank theorems were implemented using the Prototype Verification System (PVS) theorem prover. We illustrate our approach by applying the inference system on a generic Diffie-Hellman group protocol and prove it in PVS.
(Show Context)

Citation Context

...readable and very complex to construct. There are many other efforts in the literature that deal with formal analysis for GDH style protocols. Some used symbolic approaches such as the work of Mazaré =-=[17]-=- who proposed a symbolic model to analyze cryptographic protocols using bilinear pairing. Boreale and Buscemi [3] used another symbolic approach to verify protocols checking consistency of symbolic tr...

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University