Computationally sound implementations of equational theories against passive adversaries
Identifieur interne : 000276 ( PascalFrancis/Corpus ); précédent : 000275; suivant : 000277Computationally sound implementations of equational theories against passive adversaries
Auteurs : Mathieu Baudet ; Véronique Cortier ; Steve KremerSource :
- Information and computation : (Print) [ 0890-5401 ] ; 2009.
Descripteurs français
- Pascal (Inist)
English descriptors
- KwdEn :
Abstract
In this paper we study the link between formal and cryptographic models for security protocols in the presence of passive adversaries. In contrast to other works, we do not consider a fixed set of primitives but aim at results for arbitrary equational theories. We define a framework for comparing a cryptographic implementation and its idealization with respect to various security notions. In particular, we concentrate on the computational soundness of static equivalence, a standard tool in cryptographic pi calculi. We present a soundness criterion, which for many theories is not only sufficient but also necessary. Finally, to illustrate our framework, we establish the soundness of static equivalence for the exclusive OR and a theory of ciphers and lists.
Notice en format standard (ISO 2709)
Pour connaître la documentation sur le format Inist Standard.
pA |
|
---|
Format Inist (serveur)
NO : | PASCAL 09-0176595 INIST |
---|---|
ET : | Computationally sound implementations of equational theories against passive adversaries |
AU : | BAUDET (Mathieu); CORTIER (Véronique); KREMER (Steve) |
AF : | DCSSI/Paris/France (1 aut.); Loria/CNRS &/INRIA Lorraine Projet Cassis/France (2 aut.); LSV/CNRS & INRIA Saclay Projet SECSI & ENS Cachan/France (3 aut.) |
DT : | Publication en série; Niveau analytique |
SO : | Information and computation : (Print); ISSN 0890-5401; Coden INFCEC; Etats-Unis; Da. 2009; Vol. 207; No. 4; Pp. 496-520; Bibl. 40 ref. |
LA : | Anglais |
EA : | In this paper we study the link between formal and cryptographic models for security protocols in the presence of passive adversaries. In contrast to other works, we do not consider a fixed set of primitives but aim at results for arbitrary equational theories. We define a framework for comparing a cryptographic implementation and its idealization with respect to various security notions. In particular, we concentrate on the computational soundness of static equivalence, a standard tool in cryptographic pi calculi. We present a soundness criterion, which for many theories is not only sufficient but also necessary. Finally, to illustrate our framework, we establish the soundness of static equivalence for the exclusive OR and a theory of ciphers and lists. |
CC : | 001D02A08 |
FD : | Implémentation; Théorie équationnelle; Lien; Primitif; Consistance sémantique; Equivalence; Informatique théorique; Protocole sécurité |
ED : | Implementation; Equational theory; Link; Primitive; Soundness; Equivalence; Computer theory; Security protocol |
SD : | Implementación; Teoría ecuaciónal; Vínculo; Primitivo; Consistencia semantica; Equivalencia; Informática teórica |
LO : | INIST-8341.354000186726760020 |
ID : | 09-0176595 |
Links to Exploration step
Pascal:09-0176595Le document en format XML
<record><TEI><teiHeader><fileDesc><titleStmt><title xml:lang="en" level="a">Computationally sound implementations of equational theories against passive adversaries</title>
<author><name sortKey="Baudet, Mathieu" sort="Baudet, Mathieu" uniqKey="Baudet M" first="Mathieu" last="Baudet">Mathieu Baudet</name>
<affiliation><inist:fA14 i1="01"><s1>DCSSI</s1>
<s2>Paris</s2>
<s3>FRA</s3>
<sZ>1 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author><name sortKey="Cortier, Veronique" sort="Cortier, Veronique" uniqKey="Cortier V" first="Véronique" last="Cortier">Véronique Cortier</name>
<affiliation><inist:fA14 i1="02"><s1>Loria/CNRS &/INRIA Lorraine Projet Cassis</s1>
<s3>FRA</s3>
<sZ>2 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author><name sortKey="Kremer, Steve" sort="Kremer, Steve" uniqKey="Kremer S" first="Steve" last="Kremer">Steve Kremer</name>
<affiliation><inist:fA14 i1="03"><s1>LSV/CNRS & INRIA Saclay Projet SECSI & ENS Cachan</s1>
<s3>FRA</s3>
<sZ>3 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
</titleStmt>
<publicationStmt><idno type="wicri:source">INIST</idno>
<idno type="inist">09-0176595</idno>
<date when="2009">2009</date>
<idno type="stanalyst">PASCAL 09-0176595 INIST</idno>
<idno type="RBID">Pascal:09-0176595</idno>
<idno type="wicri:Area/PascalFrancis/Corpus">000276</idno>
</publicationStmt>
<sourceDesc><biblStruct><analytic><title xml:lang="en" level="a">Computationally sound implementations of equational theories against passive adversaries</title>
<author><name sortKey="Baudet, Mathieu" sort="Baudet, Mathieu" uniqKey="Baudet M" first="Mathieu" last="Baudet">Mathieu Baudet</name>
<affiliation><inist:fA14 i1="01"><s1>DCSSI</s1>
<s2>Paris</s2>
<s3>FRA</s3>
<sZ>1 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author><name sortKey="Cortier, Veronique" sort="Cortier, Veronique" uniqKey="Cortier V" first="Véronique" last="Cortier">Véronique Cortier</name>
<affiliation><inist:fA14 i1="02"><s1>Loria/CNRS &/INRIA Lorraine Projet Cassis</s1>
<s3>FRA</s3>
<sZ>2 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author><name sortKey="Kremer, Steve" sort="Kremer, Steve" uniqKey="Kremer S" first="Steve" last="Kremer">Steve Kremer</name>
<affiliation><inist:fA14 i1="03"><s1>LSV/CNRS & INRIA Saclay Projet SECSI & ENS Cachan</s1>
<s3>FRA</s3>
<sZ>3 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
</analytic>
<series><title level="j" type="main">Information and computation : (Print)</title>
<title level="j" type="abbreviated">Inf. comput. : (Print)</title>
<idno type="ISSN">0890-5401</idno>
<imprint><date when="2009">2009</date>
</imprint>
</series>
</biblStruct>
</sourceDesc>
<seriesStmt><title level="j" type="main">Information and computation : (Print)</title>
<title level="j" type="abbreviated">Inf. comput. : (Print)</title>
<idno type="ISSN">0890-5401</idno>
</seriesStmt>
</fileDesc>
<profileDesc><textClass><keywords scheme="KwdEn" xml:lang="en"><term>Computer theory</term>
<term>Equational theory</term>
<term>Equivalence</term>
<term>Implementation</term>
<term>Link</term>
<term>Primitive</term>
<term>Security protocol</term>
<term>Soundness</term>
</keywords>
<keywords scheme="Pascal" xml:lang="fr"><term>Implémentation</term>
<term>Théorie équationnelle</term>
<term>Lien</term>
<term>Primitif</term>
<term>Consistance sémantique</term>
<term>Equivalence</term>
<term>Informatique théorique</term>
<term>Protocole sécurité</term>
</keywords>
</textClass>
</profileDesc>
</teiHeader>
<front><div type="abstract" xml:lang="en">In this paper we study the link between formal and cryptographic models for security protocols in the presence of passive adversaries. In contrast to other works, we do not consider a fixed set of primitives but aim at results for arbitrary equational theories. We define a framework for comparing a cryptographic implementation and its idealization with respect to various security notions. In particular, we concentrate on the computational soundness of static equivalence, a standard tool in cryptographic pi calculi. We present a soundness criterion, which for many theories is not only sufficient but also necessary. Finally, to illustrate our framework, we establish the soundness of static equivalence for the exclusive OR and a theory of ciphers and lists.</div>
</front>
</TEI>
<inist><standard h6="B"><pA><fA01 i1="01" i2="1"><s0>0890-5401</s0>
</fA01>
<fA02 i1="01"><s0>INFCEC</s0>
</fA02>
<fA03 i2="1"><s0>Inf. comput. : (Print)</s0>
</fA03>
<fA05><s2>207</s2>
</fA05>
<fA06><s2>4</s2>
</fA06>
<fA08 i1="01" i2="1" l="ENG"><s1>Computationally sound implementations of equational theories against passive adversaries</s1>
</fA08>
<fA11 i1="01" i2="1"><s1>BAUDET (Mathieu)</s1>
</fA11>
<fA11 i1="02" i2="1"><s1>CORTIER (Véronique)</s1>
</fA11>
<fA11 i1="03" i2="1"><s1>KREMER (Steve)</s1>
</fA11>
<fA14 i1="01"><s1>DCSSI</s1>
<s2>Paris</s2>
<s3>FRA</s3>
<sZ>1 aut.</sZ>
</fA14>
<fA14 i1="02"><s1>Loria/CNRS &/INRIA Lorraine Projet Cassis</s1>
<s3>FRA</s3>
<sZ>2 aut.</sZ>
</fA14>
<fA14 i1="03"><s1>LSV/CNRS & INRIA Saclay Projet SECSI & ENS Cachan</s1>
<s3>FRA</s3>
<sZ>3 aut.</sZ>
</fA14>
<fA20><s1>496-520</s1>
</fA20>
<fA21><s1>2009</s1>
</fA21>
<fA23 i1="01"><s0>ENG</s0>
</fA23>
<fA43 i1="01"><s1>INIST</s1>
<s2>8341</s2>
<s5>354000186726760020</s5>
</fA43>
<fA44><s0>0000</s0>
<s1>© 2009 INIST-CNRS. All rights reserved.</s1>
</fA44>
<fA45><s0>40 ref.</s0>
</fA45>
<fA47 i1="01" i2="1"><s0>09-0176595</s0>
</fA47>
<fA60><s1>P</s1>
</fA60>
<fA61><s0>A</s0>
</fA61>
<fA64 i1="01" i2="1"><s0>Information and computation : (Print)</s0>
</fA64>
<fA66 i1="01"><s0>USA</s0>
</fA66>
<fC01 i1="01" l="ENG"><s0>In this paper we study the link between formal and cryptographic models for security protocols in the presence of passive adversaries. In contrast to other works, we do not consider a fixed set of primitives but aim at results for arbitrary equational theories. We define a framework for comparing a cryptographic implementation and its idealization with respect to various security notions. In particular, we concentrate on the computational soundness of static equivalence, a standard tool in cryptographic pi calculi. We present a soundness criterion, which for many theories is not only sufficient but also necessary. Finally, to illustrate our framework, we establish the soundness of static equivalence for the exclusive OR and a theory of ciphers and lists.</s0>
</fC01>
<fC02 i1="01" i2="X"><s0>001D02A08</s0>
</fC02>
<fC03 i1="01" i2="X" l="FRE"><s0>Implémentation</s0>
<s5>17</s5>
</fC03>
<fC03 i1="01" i2="X" l="ENG"><s0>Implementation</s0>
<s5>17</s5>
</fC03>
<fC03 i1="01" i2="X" l="SPA"><s0>Implementación</s0>
<s5>17</s5>
</fC03>
<fC03 i1="02" i2="X" l="FRE"><s0>Théorie équationnelle</s0>
<s5>18</s5>
</fC03>
<fC03 i1="02" i2="X" l="ENG"><s0>Equational theory</s0>
<s5>18</s5>
</fC03>
<fC03 i1="02" i2="X" l="SPA"><s0>Teoría ecuaciónal</s0>
<s5>18</s5>
</fC03>
<fC03 i1="03" i2="X" l="FRE"><s0>Lien</s0>
<s5>19</s5>
</fC03>
<fC03 i1="03" i2="X" l="ENG"><s0>Link</s0>
<s5>19</s5>
</fC03>
<fC03 i1="03" i2="X" l="SPA"><s0>Vínculo</s0>
<s5>19</s5>
</fC03>
<fC03 i1="04" i2="X" l="FRE"><s0>Primitif</s0>
<s5>20</s5>
</fC03>
<fC03 i1="04" i2="X" l="ENG"><s0>Primitive</s0>
<s5>20</s5>
</fC03>
<fC03 i1="04" i2="X" l="SPA"><s0>Primitivo</s0>
<s5>20</s5>
</fC03>
<fC03 i1="05" i2="X" l="FRE"><s0>Consistance sémantique</s0>
<s5>21</s5>
</fC03>
<fC03 i1="05" i2="X" l="ENG"><s0>Soundness</s0>
<s5>21</s5>
</fC03>
<fC03 i1="05" i2="X" l="SPA"><s0>Consistencia semantica</s0>
<s5>21</s5>
</fC03>
<fC03 i1="06" i2="X" l="FRE"><s0>Equivalence</s0>
<s5>22</s5>
</fC03>
<fC03 i1="06" i2="X" l="ENG"><s0>Equivalence</s0>
<s5>22</s5>
</fC03>
<fC03 i1="06" i2="X" l="SPA"><s0>Equivalencia</s0>
<s5>22</s5>
</fC03>
<fC03 i1="07" i2="X" l="FRE"><s0>Informatique théorique</s0>
<s5>23</s5>
</fC03>
<fC03 i1="07" i2="X" l="ENG"><s0>Computer theory</s0>
<s5>23</s5>
</fC03>
<fC03 i1="07" i2="X" l="SPA"><s0>Informática teórica</s0>
<s5>23</s5>
</fC03>
<fC03 i1="08" i2="X" l="FRE"><s0>Protocole sécurité</s0>
<s4>CD</s4>
<s5>96</s5>
</fC03>
<fC03 i1="08" i2="X" l="ENG"><s0>Security protocol</s0>
<s4>CD</s4>
<s5>96</s5>
</fC03>
<fN21><s1>131</s1>
</fN21>
<fN44 i1="01"><s1>OTO</s1>
</fN44>
<fN82><s1>OTO</s1>
</fN82>
</pA>
</standard>
<server><NO>PASCAL 09-0176595 INIST</NO>
<ET>Computationally sound implementations of equational theories against passive adversaries</ET>
<AU>BAUDET (Mathieu); CORTIER (Véronique); KREMER (Steve)</AU>
<AF>DCSSI/Paris/France (1 aut.); Loria/CNRS &/INRIA Lorraine Projet Cassis/France (2 aut.); LSV/CNRS & INRIA Saclay Projet SECSI & ENS Cachan/France (3 aut.)</AF>
<DT>Publication en série; Niveau analytique</DT>
<SO>Information and computation : (Print); ISSN 0890-5401; Coden INFCEC; Etats-Unis; Da. 2009; Vol. 207; No. 4; Pp. 496-520; Bibl. 40 ref.</SO>
<LA>Anglais</LA>
<EA>In this paper we study the link between formal and cryptographic models for security protocols in the presence of passive adversaries. In contrast to other works, we do not consider a fixed set of primitives but aim at results for arbitrary equational theories. We define a framework for comparing a cryptographic implementation and its idealization with respect to various security notions. In particular, we concentrate on the computational soundness of static equivalence, a standard tool in cryptographic pi calculi. We present a soundness criterion, which for many theories is not only sufficient but also necessary. Finally, to illustrate our framework, we establish the soundness of static equivalence for the exclusive OR and a theory of ciphers and lists.</EA>
<CC>001D02A08</CC>
<FD>Implémentation; Théorie équationnelle; Lien; Primitif; Consistance sémantique; Equivalence; Informatique théorique; Protocole sécurité</FD>
<ED>Implementation; Equational theory; Link; Primitive; Soundness; Equivalence; Computer theory; Security protocol</ED>
<SD>Implementación; Teoría ecuaciónal; Vínculo; Primitivo; Consistencia semantica; Equivalencia; Informática teórica</SD>
<LO>INIST-8341.354000186726760020</LO>
<ID>09-0176595</ID>
</server>
</inist>
</record>
Pour manipuler ce document sous Unix (Dilib)
EXPLOR_STEP=$WICRI_ROOT/Wicri/Lorraine/explor/InforLorV4/Data/PascalFrancis/Corpus
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 000276 | SxmlIndent | more
Ou
HfdSelect -h $EXPLOR_AREA/Data/PascalFrancis/Corpus/biblio.hfd -nk 000276 | SxmlIndent | more
Pour mettre un lien sur cette page dans le réseau Wicri
{{Explor lien |wiki= Wicri/Lorraine |area= InforLorV4 |flux= PascalFrancis |étape= Corpus |type= RBID |clé= Pascal:09-0176595 |texte= Computationally sound implementations of equational theories against passive adversaries }}
![]() | This area was generated with Dilib version V0.6.33. | ![]() |