Serveur d'exploration sur la recherche en informatique en Lorraine

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.

Computationally sound implementations of equational theories against passive adversaries

Identifieur interne : 000276 ( PascalFrancis/Corpus ); précédent : 000275; suivant : 000277

Computationally sound implementations of equational theories against passive adversaries

Auteurs : Mathieu Baudet ; Véronique Cortier ; Steve Kremer

Source :

RBID : Pascal:09-0176595

Descripteurs français

English descriptors

Abstract

In this paper we study the link between formal and cryptographic models for security protocols in the presence of passive adversaries. In contrast to other works, we do not consider a fixed set of primitives but aim at results for arbitrary equational theories. We define a framework for comparing a cryptographic implementation and its idealization with respect to various security notions. In particular, we concentrate on the computational soundness of static equivalence, a standard tool in cryptographic pi calculi. We present a soundness criterion, which for many theories is not only sufficient but also necessary. Finally, to illustrate our framework, we establish the soundness of static equivalence for the exclusive OR and a theory of ciphers and lists.

Notice en format standard (ISO 2709)

Pour connaître la documentation sur le format Inist Standard.

pA  
A01 01  1    @0 0890-5401
A02 01      @0 INFCEC
A03   1    @0 Inf. comput. : (Print)
A05       @2 207
A06       @2 4
A08 01  1  ENG  @1 Computationally sound implementations of equational theories against passive adversaries
A11 01  1    @1 BAUDET (Mathieu)
A11 02  1    @1 CORTIER (Véronique)
A11 03  1    @1 KREMER (Steve)
A14 01      @1 DCSSI @2 Paris @3 FRA @Z 1 aut.
A14 02      @1 Loria/CNRS &/INRIA Lorraine Projet Cassis @3 FRA @Z 2 aut.
A14 03      @1 LSV/CNRS & INRIA Saclay Projet SECSI & ENS Cachan @3 FRA @Z 3 aut.
A20       @1 496-520
A21       @1 2009
A23 01      @0 ENG
A43 01      @1 INIST @2 8341 @5 354000186726760020
A44       @0 0000 @1 © 2009 INIST-CNRS. All rights reserved.
A45       @0 40 ref.
A47 01  1    @0 09-0176595
A60       @1 P
A61       @0 A
A64 01  1    @0 Information and computation : (Print)
A66 01      @0 USA
C01 01    ENG  @0 In this paper we study the link between formal and cryptographic models for security protocols in the presence of passive adversaries. In contrast to other works, we do not consider a fixed set of primitives but aim at results for arbitrary equational theories. We define a framework for comparing a cryptographic implementation and its idealization with respect to various security notions. In particular, we concentrate on the computational soundness of static equivalence, a standard tool in cryptographic pi calculi. We present a soundness criterion, which for many theories is not only sufficient but also necessary. Finally, to illustrate our framework, we establish the soundness of static equivalence for the exclusive OR and a theory of ciphers and lists.
C02 01  X    @0 001D02A08
C03 01  X  FRE  @0 Implémentation @5 17
C03 01  X  ENG  @0 Implementation @5 17
C03 01  X  SPA  @0 Implementación @5 17
C03 02  X  FRE  @0 Théorie équationnelle @5 18
C03 02  X  ENG  @0 Equational theory @5 18
C03 02  X  SPA  @0 Teoría ecuaciónal @5 18
C03 03  X  FRE  @0 Lien @5 19
C03 03  X  ENG  @0 Link @5 19
C03 03  X  SPA  @0 Vínculo @5 19
C03 04  X  FRE  @0 Primitif @5 20
C03 04  X  ENG  @0 Primitive @5 20
C03 04  X  SPA  @0 Primitivo @5 20
C03 05  X  FRE  @0 Consistance sémantique @5 21
C03 05  X  ENG  @0 Soundness @5 21
C03 05  X  SPA  @0 Consistencia semantica @5 21
C03 06  X  FRE  @0 Equivalence @5 22
C03 06  X  ENG  @0 Equivalence @5 22
C03 06  X  SPA  @0 Equivalencia @5 22
C03 07  X  FRE  @0 Informatique théorique @5 23
C03 07  X  ENG  @0 Computer theory @5 23
C03 07  X  SPA  @0 Informática teórica @5 23
C03 08  X  FRE  @0 Protocole sécurité @4 CD @5 96
C03 08  X  ENG  @0 Security protocol @4 CD @5 96
N21       @1 131
N44 01      @1 OTO
N82       @1 OTO

Format Inist (serveur)

NO : PASCAL 09-0176595 INIST
ET : Computationally sound implementations of equational theories against passive adversaries
AU : BAUDET (Mathieu); CORTIER (Véronique); KREMER (Steve)
AF : DCSSI/Paris/France (1 aut.); Loria/CNRS &/INRIA Lorraine Projet Cassis/France (2 aut.); LSV/CNRS & INRIA Saclay Projet SECSI & ENS Cachan/France (3 aut.)
DT : Publication en série; Niveau analytique
SO : Information and computation : (Print); ISSN 0890-5401; Coden INFCEC; Etats-Unis; Da. 2009; Vol. 207; No. 4; Pp. 496-520; Bibl. 40 ref.
LA : Anglais
EA : In this paper we study the link between formal and cryptographic models for security protocols in the presence of passive adversaries. In contrast to other works, we do not consider a fixed set of primitives but aim at results for arbitrary equational theories. We define a framework for comparing a cryptographic implementation and its idealization with respect to various security notions. In particular, we concentrate on the computational soundness of static equivalence, a standard tool in cryptographic pi calculi. We present a soundness criterion, which for many theories is not only sufficient but also necessary. Finally, to illustrate our framework, we establish the soundness of static equivalence for the exclusive OR and a theory of ciphers and lists.
CC : 001D02A08
FD : Implémentation; Théorie équationnelle; Lien; Primitif; Consistance sémantique; Equivalence; Informatique théorique; Protocole sécurité
ED : Implementation; Equational theory; Link; Primitive; Soundness; Equivalence; Computer theory; Security protocol
SD : Implementación; Teoría ecuaciónal; Vínculo; Primitivo; Consistencia semantica; Equivalencia; Informática teórica
LO : INIST-8341.354000186726760020
ID : 09-0176595

Links to Exploration step

Pascal:09-0176595

Le document en format XML

<record>
<TEI>
<teiHeader>
<fileDesc>
<titleStmt>
<title xml:lang="en" level="a">Computationally sound implementations of equational theories against passive adversaries</title>
<author>
<name sortKey="Baudet, Mathieu" sort="Baudet, Mathieu" uniqKey="Baudet M" first="Mathieu" last="Baudet">Mathieu Baudet</name>
<affiliation>
<inist:fA14 i1="01">
<s1>DCSSI</s1>
<s2>Paris</s2>
<s3>FRA</s3>
<sZ>1 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author>
<name sortKey="Cortier, Veronique" sort="Cortier, Veronique" uniqKey="Cortier V" first="Véronique" last="Cortier">Véronique Cortier</name>
<affiliation>
<inist:fA14 i1="02">
<s1>Loria/CNRS &/INRIA Lorraine Projet Cassis</s1>
<s3>FRA</s3>
<sZ>2 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author>
<name sortKey="Kremer, Steve" sort="Kremer, Steve" uniqKey="Kremer S" first="Steve" last="Kremer">Steve Kremer</name>
<affiliation>
<inist:fA14 i1="03">
<s1>LSV/CNRS & INRIA Saclay Projet SECSI & ENS Cachan</s1>
<s3>FRA</s3>
<sZ>3 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
</titleStmt>
<publicationStmt>
<idno type="wicri:source">INIST</idno>
<idno type="inist">09-0176595</idno>
<date when="2009">2009</date>
<idno type="stanalyst">PASCAL 09-0176595 INIST</idno>
<idno type="RBID">Pascal:09-0176595</idno>
<idno type="wicri:Area/PascalFrancis/Corpus">000276</idno>
</publicationStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title xml:lang="en" level="a">Computationally sound implementations of equational theories against passive adversaries</title>
<author>
<name sortKey="Baudet, Mathieu" sort="Baudet, Mathieu" uniqKey="Baudet M" first="Mathieu" last="Baudet">Mathieu Baudet</name>
<affiliation>
<inist:fA14 i1="01">
<s1>DCSSI</s1>
<s2>Paris</s2>
<s3>FRA</s3>
<sZ>1 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author>
<name sortKey="Cortier, Veronique" sort="Cortier, Veronique" uniqKey="Cortier V" first="Véronique" last="Cortier">Véronique Cortier</name>
<affiliation>
<inist:fA14 i1="02">
<s1>Loria/CNRS &/INRIA Lorraine Projet Cassis</s1>
<s3>FRA</s3>
<sZ>2 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author>
<name sortKey="Kremer, Steve" sort="Kremer, Steve" uniqKey="Kremer S" first="Steve" last="Kremer">Steve Kremer</name>
<affiliation>
<inist:fA14 i1="03">
<s1>LSV/CNRS & INRIA Saclay Projet SECSI & ENS Cachan</s1>
<s3>FRA</s3>
<sZ>3 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
</analytic>
<series>
<title level="j" type="main">Information and computation : (Print)</title>
<title level="j" type="abbreviated">Inf. comput. : (Print)</title>
<idno type="ISSN">0890-5401</idno>
<imprint>
<date when="2009">2009</date>
</imprint>
</series>
</biblStruct>
</sourceDesc>
<seriesStmt>
<title level="j" type="main">Information and computation : (Print)</title>
<title level="j" type="abbreviated">Inf. comput. : (Print)</title>
<idno type="ISSN">0890-5401</idno>
</seriesStmt>
</fileDesc>
<profileDesc>
<textClass>
<keywords scheme="KwdEn" xml:lang="en">
<term>Computer theory</term>
<term>Equational theory</term>
<term>Equivalence</term>
<term>Implementation</term>
<term>Link</term>
<term>Primitive</term>
<term>Security protocol</term>
<term>Soundness</term>
</keywords>
<keywords scheme="Pascal" xml:lang="fr">
<term>Implémentation</term>
<term>Théorie équationnelle</term>
<term>Lien</term>
<term>Primitif</term>
<term>Consistance sémantique</term>
<term>Equivalence</term>
<term>Informatique théorique</term>
<term>Protocole sécurité</term>
</keywords>
</textClass>
</profileDesc>
</teiHeader>
<front>
<div type="abstract" xml:lang="en">In this paper we study the link between formal and cryptographic models for security protocols in the presence of passive adversaries. In contrast to other works, we do not consider a fixed set of primitives but aim at results for arbitrary equational theories. We define a framework for comparing a cryptographic implementation and its idealization with respect to various security notions. In particular, we concentrate on the computational soundness of static equivalence, a standard tool in cryptographic pi calculi. We present a soundness criterion, which for many theories is not only sufficient but also necessary. Finally, to illustrate our framework, we establish the soundness of static equivalence for the exclusive OR and a theory of ciphers and lists.</div>
</front>
</TEI>
<inist>
<standard h6="B">
<pA>
<fA01 i1="01" i2="1">
<s0>0890-5401</s0>
</fA01>
<fA02 i1="01">
<s0>INFCEC</s0>
</fA02>
<fA03 i2="1">
<s0>Inf. comput. : (Print)</s0>
</fA03>
<fA05>
<s2>207</s2>
</fA05>
<fA06>
<s2>4</s2>
</fA06>
<fA08 i1="01" i2="1" l="ENG">
<s1>Computationally sound implementations of equational theories against passive adversaries</s1>
</fA08>
<fA11 i1="01" i2="1">
<s1>BAUDET (Mathieu)</s1>
</fA11>
<fA11 i1="02" i2="1">
<s1>CORTIER (Véronique)</s1>
</fA11>
<fA11 i1="03" i2="1">
<s1>KREMER (Steve)</s1>
</fA11>
<fA14 i1="01">
<s1>DCSSI</s1>
<s2>Paris</s2>
<s3>FRA</s3>
<sZ>1 aut.</sZ>
</fA14>
<fA14 i1="02">
<s1>Loria/CNRS &/INRIA Lorraine Projet Cassis</s1>
<s3>FRA</s3>
<sZ>2 aut.</sZ>
</fA14>
<fA14 i1="03">
<s1>LSV/CNRS & INRIA Saclay Projet SECSI & ENS Cachan</s1>
<s3>FRA</s3>
<sZ>3 aut.</sZ>
</fA14>
<fA20>
<s1>496-520</s1>
</fA20>
<fA21>
<s1>2009</s1>
</fA21>
<fA23 i1="01">
<s0>ENG</s0>
</fA23>
<fA43 i1="01">
<s1>INIST</s1>
<s2>8341</s2>
<s5>354000186726760020</s5>
</fA43>
<fA44>
<s0>0000</s0>
<s1>© 2009 INIST-CNRS. All rights reserved.</s1>
</fA44>
<fA45>
<s0>40 ref.</s0>
</fA45>
<fA47 i1="01" i2="1">
<s0>09-0176595</s0>
</fA47>
<fA60>
<s1>P</s1>
</fA60>
<fA61>
<s0>A</s0>
</fA61>
<fA64 i1="01" i2="1">
<s0>Information and computation : (Print)</s0>
</fA64>
<fA66 i1="01">
<s0>USA</s0>
</fA66>
<fC01 i1="01" l="ENG">
<s0>In this paper we study the link between formal and cryptographic models for security protocols in the presence of passive adversaries. In contrast to other works, we do not consider a fixed set of primitives but aim at results for arbitrary equational theories. We define a framework for comparing a cryptographic implementation and its idealization with respect to various security notions. In particular, we concentrate on the computational soundness of static equivalence, a standard tool in cryptographic pi calculi. We present a soundness criterion, which for many theories is not only sufficient but also necessary. Finally, to illustrate our framework, we establish the soundness of static equivalence for the exclusive OR and a theory of ciphers and lists.</s0>
</fC01>
<fC02 i1="01" i2="X">
<s0>001D02A08</s0>
</fC02>
<fC03 i1="01" i2="X" l="FRE">
<s0>Implémentation</s0>
<s5>17</s5>
</fC03>
<fC03 i1="01" i2="X" l="ENG">
<s0>Implementation</s0>
<s5>17</s5>
</fC03>
<fC03 i1="01" i2="X" l="SPA">
<s0>Implementación</s0>
<s5>17</s5>
</fC03>
<fC03 i1="02" i2="X" l="FRE">
<s0>Théorie équationnelle</s0>
<s5>18</s5>
</fC03>
<fC03 i1="02" i2="X" l="ENG">
<s0>Equational theory</s0>
<s5>18</s5>
</fC03>
<fC03 i1="02" i2="X" l="SPA">
<s0>Teoría ecuaciónal</s0>
<s5>18</s5>
</fC03>
<fC03 i1="03" i2="X" l="FRE">
<s0>Lien</s0>
<s5>19</s5>
</fC03>
<fC03 i1="03" i2="X" l="ENG">
<s0>Link</s0>
<s5>19</s5>
</fC03>
<fC03 i1="03" i2="X" l="SPA">
<s0>Vínculo</s0>
<s5>19</s5>
</fC03>
<fC03 i1="04" i2="X" l="FRE">
<s0>Primitif</s0>
<s5>20</s5>
</fC03>
<fC03 i1="04" i2="X" l="ENG">
<s0>Primitive</s0>
<s5>20</s5>
</fC03>
<fC03 i1="04" i2="X" l="SPA">
<s0>Primitivo</s0>
<s5>20</s5>
</fC03>
<fC03 i1="05" i2="X" l="FRE">
<s0>Consistance sémantique</s0>
<s5>21</s5>
</fC03>
<fC03 i1="05" i2="X" l="ENG">
<s0>Soundness</s0>
<s5>21</s5>
</fC03>
<fC03 i1="05" i2="X" l="SPA">
<s0>Consistencia semantica</s0>
<s5>21</s5>
</fC03>
<fC03 i1="06" i2="X" l="FRE">
<s0>Equivalence</s0>
<s5>22</s5>
</fC03>
<fC03 i1="06" i2="X" l="ENG">
<s0>Equivalence</s0>
<s5>22</s5>
</fC03>
<fC03 i1="06" i2="X" l="SPA">
<s0>Equivalencia</s0>
<s5>22</s5>
</fC03>
<fC03 i1="07" i2="X" l="FRE">
<s0>Informatique théorique</s0>
<s5>23</s5>
</fC03>
<fC03 i1="07" i2="X" l="ENG">
<s0>Computer theory</s0>
<s5>23</s5>
</fC03>
<fC03 i1="07" i2="X" l="SPA">
<s0>Informática teórica</s0>
<s5>23</s5>
</fC03>
<fC03 i1="08" i2="X" l="FRE">
<s0>Protocole sécurité</s0>
<s4>CD</s4>
<s5>96</s5>
</fC03>
<fC03 i1="08" i2="X" l="ENG">
<s0>Security protocol</s0>
<s4>CD</s4>
<s5>96</s5>
</fC03>
<fN21>
<s1>131</s1>
</fN21>
<fN44 i1="01">
<s1>OTO</s1>
</fN44>
<fN82>
<s1>OTO</s1>
</fN82>
</pA>
</standard>
<server>
<NO>PASCAL 09-0176595 INIST</NO>
<ET>Computationally sound implementations of equational theories against passive adversaries</ET>
<AU>BAUDET (Mathieu); CORTIER (Véronique); KREMER (Steve)</AU>
<AF>DCSSI/Paris/France (1 aut.); Loria/CNRS &/INRIA Lorraine Projet Cassis/France (2 aut.); LSV/CNRS & INRIA Saclay Projet SECSI & ENS Cachan/France (3 aut.)</AF>
<DT>Publication en série; Niveau analytique</DT>
<SO>Information and computation : (Print); ISSN 0890-5401; Coden INFCEC; Etats-Unis; Da. 2009; Vol. 207; No. 4; Pp. 496-520; Bibl. 40 ref.</SO>
<LA>Anglais</LA>
<EA>In this paper we study the link between formal and cryptographic models for security protocols in the presence of passive adversaries. In contrast to other works, we do not consider a fixed set of primitives but aim at results for arbitrary equational theories. We define a framework for comparing a cryptographic implementation and its idealization with respect to various security notions. In particular, we concentrate on the computational soundness of static equivalence, a standard tool in cryptographic pi calculi. We present a soundness criterion, which for many theories is not only sufficient but also necessary. Finally, to illustrate our framework, we establish the soundness of static equivalence for the exclusive OR and a theory of ciphers and lists.</EA>
<CC>001D02A08</CC>
<FD>Implémentation; Théorie équationnelle; Lien; Primitif; Consistance sémantique; Equivalence; Informatique théorique; Protocole sécurité</FD>
<ED>Implementation; Equational theory; Link; Primitive; Soundness; Equivalence; Computer theory; Security protocol</ED>
<SD>Implementación; Teoría ecuaciónal; Vínculo; Primitivo; Consistencia semantica; Equivalencia; Informática teórica</SD>
<LO>INIST-8341.354000186726760020</LO>
<ID>09-0176595</ID>
</server>
</inist>
</record>

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Wicri/Lorraine/explor/InforLorV4/Data/PascalFrancis/Corpus
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 000276 | SxmlIndent | more

Ou

HfdSelect -h $EXPLOR_AREA/Data/PascalFrancis/Corpus/biblio.hfd -nk 000276 | SxmlIndent | more

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Wicri/Lorraine
   |area=    InforLorV4
   |flux=    PascalFrancis
   |étape=   Corpus
   |type=    RBID
   |clé=     Pascal:09-0176595
   |texte=   Computationally sound implementations of equational theories against passive adversaries
}}

Wicri

This area was generated with Dilib version V0.6.33.
Data generation: Mon Jun 10 21:56:28 2019. Site generation: Fri Feb 25 15:29:27 2022