Serveur d'exploration sur la recherche en informatique en Lorraine

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.

Synthesizing Secure Protocols

Identifieur interne : 002D90 ( Istex/Curation ); précédent : 002D89; suivant : 002D91

Synthesizing Secure Protocols

Auteurs : Véronique Cortier [France] ; Bogdan Warinschi [Royaume-Uni] ; Eugen Z Linescu [France]

Source :

RBID : ISTEX:C324D678C9CFEEE1474E54D3559F800C9A63A9A6

Abstract

Abstract: We propose a general transformation that maps a cryptographic protocol that is secure in an extremely weak sense (essentially in a model where no adversary is present) into a protocol that is secure against a fully active adversary which interacts with an unbounded number of protocol sessions, and has absolute control over the network. The transformation works for arbitrary protocols with any number of participants, written with usual cryptographic primitives. Our transformation provably preserves a large class of security properties that contains secrecy and authenticity. An important byproduct contribution of this paper is a modular protocol development paradigm where designers focus their effort on an extremely simple execution setting – security in more complex settings being ensured by our generic transformation. Conceptually, the transformation is very simple, and has a clean, well motivated design. Each message is tied to the session for which it is intended via digital signatures and on-the-fly generated session identifiers, and prevents replay attacks by encrypting the messages under the recipient’s public key.

Url:
DOI: 10.1007/978-3-540-74835-9_27

Links toward previous steps (curation, corpus...)


Links to Exploration step

ISTEX:C324D678C9CFEEE1474E54D3559F800C9A63A9A6

Le document en format XML

<record>
<TEI wicri:istexFullTextTei="biblStruct">
<teiHeader>
<fileDesc>
<titleStmt>
<title xml:lang="en">Synthesizing Secure Protocols</title>
<author>
<name sortKey="Cortier, Veronique" sort="Cortier, Veronique" uniqKey="Cortier V" first="Véronique" last="Cortier">Véronique Cortier</name>
<affiliation>
<mods:affiliation>Loria UMR 7503 & CNRS & INRIA Lorraine, Project Cassis,  </mods:affiliation>
<wicri:noCountry code="subField"> </wicri:noCountry>
</affiliation>
<affiliation wicri:level="1">
<mods:affiliation>E-mail: Veronique.Cortier@loria.fr</mods:affiliation>
<country wicri:rule="url">France</country>
</affiliation>
</author>
<author>
<name sortKey="Warinschi, Bogdan" sort="Warinschi, Bogdan" uniqKey="Warinschi B" first="Bogdan" last="Warinschi">Bogdan Warinschi</name>
<affiliation>
<mods:affiliation>Computer Science Department, University of Bristol,  </mods:affiliation>
<wicri:noCountry code="subField"> </wicri:noCountry>
</affiliation>
<affiliation wicri:level="1">
<mods:affiliation>E-mail: bogdan@cs.bris.ac.uk</mods:affiliation>
<country wicri:rule="url">Royaume-Uni</country>
</affiliation>
</author>
<author>
<name sortKey="Z Linescu, Eugen" sort="Z Linescu, Eugen" uniqKey="Z Linescu E" first="Eugen" last="Z Linescu">Eugen Z Linescu</name>
<affiliation>
<mods:affiliation>Loria UMR 7503 & CNRS & INRIA Lorraine, Project Cassis,  </mods:affiliation>
<wicri:noCountry code="subField"> </wicri:noCountry>
</affiliation>
<affiliation wicri:level="1">
<mods:affiliation>E-mail: Eugen.Zalinescu@loria.fr</mods:affiliation>
<country wicri:rule="url">France</country>
</affiliation>
</author>
</titleStmt>
<publicationStmt>
<idno type="wicri:source">ISTEX</idno>
<idno type="RBID">ISTEX:C324D678C9CFEEE1474E54D3559F800C9A63A9A6</idno>
<date when="2007" year="2007">2007</date>
<idno type="doi">10.1007/978-3-540-74835-9_27</idno>
<idno type="url">https://api.istex.fr/ark:/67375/HCB-GLXBQCS5-R/fulltext.pdf</idno>
<idno type="wicri:Area/Istex/Corpus">002E28</idno>
<idno type="wicri:explorRef" wicri:stream="Istex" wicri:step="Corpus" wicri:corpus="ISTEX">002E28</idno>
<idno type="wicri:Area/Istex/Curation">002D90</idno>
</publicationStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title level="a" type="main" xml:lang="en">Synthesizing Secure Protocols</title>
<author>
<name sortKey="Cortier, Veronique" sort="Cortier, Veronique" uniqKey="Cortier V" first="Véronique" last="Cortier">Véronique Cortier</name>
<affiliation>
<mods:affiliation>Loria UMR 7503 & CNRS & INRIA Lorraine, Project Cassis,  </mods:affiliation>
</affiliation>
<affiliation wicri:level="1">
<mods:affiliation>E-mail: Veronique.Cortier@loria.fr</mods:affiliation>
<country wicri:rule="url">France</country>
</affiliation>
</author>
<author>
<name sortKey="Warinschi, Bogdan" sort="Warinschi, Bogdan" uniqKey="Warinschi B" first="Bogdan" last="Warinschi">Bogdan Warinschi</name>
<affiliation>
<mods:affiliation>Computer Science Department, University of Bristol,  </mods:affiliation>
</affiliation>
<affiliation wicri:level="1">
<mods:affiliation>E-mail: bogdan@cs.bris.ac.uk</mods:affiliation>
<country wicri:rule="url">Royaume-Uni</country>
</affiliation>
</author>
<author>
<name sortKey="Z Linescu, Eugen" sort="Z Linescu, Eugen" uniqKey="Z Linescu E" first="Eugen" last="Z Linescu">Eugen Z Linescu</name>
<affiliation>
<mods:affiliation>Loria UMR 7503 & CNRS & INRIA Lorraine, Project Cassis,  </mods:affiliation>
</affiliation>
<affiliation wicri:level="1">
<mods:affiliation>E-mail: Eugen.Zalinescu@loria.fr</mods:affiliation>
<country wicri:rule="url">France</country>
</affiliation>
</author>
</analytic>
<monogr></monogr>
<series>
<title level="s" type="main" xml:lang="en">Lecture Notes in Computer Science</title>
<idno type="ISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
<idno type="ISSN">0302-9743</idno>
</series>
</biblStruct>
</sourceDesc>
<seriesStmt>
<idno type="ISSN">0302-9743</idno>
</seriesStmt>
</fileDesc>
<profileDesc>
<textClass></textClass>
</profileDesc>
</teiHeader>
<front>
<div type="abstract" xml:lang="en">Abstract: We propose a general transformation that maps a cryptographic protocol that is secure in an extremely weak sense (essentially in a model where no adversary is present) into a protocol that is secure against a fully active adversary which interacts with an unbounded number of protocol sessions, and has absolute control over the network. The transformation works for arbitrary protocols with any number of participants, written with usual cryptographic primitives. Our transformation provably preserves a large class of security properties that contains secrecy and authenticity. An important byproduct contribution of this paper is a modular protocol development paradigm where designers focus their effort on an extremely simple execution setting – security in more complex settings being ensured by our generic transformation. Conceptually, the transformation is very simple, and has a clean, well motivated design. Each message is tied to the session for which it is intended via digital signatures and on-the-fly generated session identifiers, and prevents replay attacks by encrypting the messages under the recipient’s public key.</div>
</front>
</TEI>
</record>

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Wicri/Lorraine/explor/InforLorV4/Data/Istex/Curation
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 002D90 | SxmlIndent | more

Ou

HfdSelect -h $EXPLOR_AREA/Data/Istex/Curation/biblio.hfd -nk 002D90 | SxmlIndent | more

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Wicri/Lorraine
   |area=    InforLorV4
   |flux=    Istex
   |étape=   Curation
   |type=    RBID
   |clé=     ISTEX:C324D678C9CFEEE1474E54D3559F800C9A63A9A6
   |texte=   Synthesizing Secure Protocols
}}

Wicri

This area was generated with Dilib version V0.6.33.
Data generation: Mon Jun 10 21:56:28 2019. Site generation: Fri Feb 25 15:29:27 2022