Computationally sound symbolic secrecy in the presence of hash functions
Identifieur interne :
000382 ( PascalFrancis/Corpus );
précédent :
000381;
suivant :
000383
Computationally sound symbolic secrecy in the presence of hash functions
Auteurs : Véronique Cortier ;
Steve Kremer ;
Ralf Kusters ;
Bogdan WarinschiSource :
-
Lecture notes in computer science [ 0302-9743 ] ; 2006.
RBID : Pascal:07-0531787
Descripteurs français
- Pascal (Inist)
- Informatique théorique,
Hachage,
Cryptographie,
Protocole transmission,
Sécurité,
Décidabilité,
Prise décision,
Cryptage,
Secret,
Clé publique,
Oracle,
Fonction aléatoire,
Modélisation.
English descriptors
- KwdEn :
- Computer theory,
Cryptography,
Decidability,
Decision making,
Encryption,
Hashing,
Modeling,
Oracle,
Public key,
Random function,
Safety,
Secrecy,
Transmission protocol.
Abstract
The standard symbolic, deducibility-based notions of secrecy are in general insufficient from a cryptographic point of view, especially in presence of hash functions. In this paper we devise and motivate a more appropriate secrecy criterion which exactly captures a standard cryptographic notion of secrecy for protocols involving public-key enryption and hash functions: protocols that satisfy it are computationally secure while any violation of our criterion directly leads to an attack. Furthermore, we prove that our criterion is decidable via an NP decision procedure. Our results hold for standard security notions for encryption and hash functions modeled as random oracles.
Notice en format standard (ISO 2709)
Pour connaître la documentation sur le format Inist Standard.
pA |
A01 | 01 | 1 | | @0 0302-9743 |
---|
A05 | | | | @2 4337 |
---|
A08 | 01 | 1 | ENG | @1 Computationally sound symbolic secrecy in the presence of hash functions |
---|
A09 | 01 | 1 | ENG | @1 FSTTCS 2006 : foundations of software technology and theoretical computer science : 26th International conference, Kolkata, India, December 13-15, 2006 : proceedings |
---|
A11 | 01 | 1 | | @1 CORTIER (Véronique) |
---|
A11 | 02 | 1 | | @1 KREMER (Steve) |
---|
A11 | 03 | 1 | | @1 KUSTERS (Ralf) |
---|
A11 | 04 | 1 | | @1 WARINSCHI (Bogdan) |
---|
A12 | 01 | 1 | | @1 ARUN-KUMAR (S.) @9 ed. |
---|
A12 | 02 | 1 | | @1 GARG (Naveen) @9 ed. |
---|
A14 | 01 | | | @1 Loria, CNRS & INRIA project Cassis @3 FRA @Z 1 aut. |
---|
A14 | 02 | | | @1 LSV, CNRS & ENS Cachan & INRIA project Secsi @3 FRA @Z 2 aut. |
---|
A14 | 03 | | | @1 ETH Zurich @3 CHE @Z 3 aut. |
---|
A14 | 04 | | | @1 Loria, Univerité Henri Poincaré & INRIA project Cassis @3 FRA @Z 4 aut. |
---|
A20 | | | | @1 176-187 |
---|
A21 | | | | @1 2006 |
---|
A23 | 01 | | | @0 ENG |
---|
A26 | 01 | | | @0 3-540-49994-6 |
---|
A43 | 01 | | | @1 INIST @2 16343 @5 354000172801410180 |
---|
A44 | | | | @0 0000 @1 © 2007 INIST-CNRS. All rights reserved. |
---|
A45 | | | | @0 16 ref. |
---|
A47 | 01 | 1 | | @0 07-0531787 |
---|
A60 | | | | @1 P @2 C |
---|
A61 | | | | @0 A |
---|
A64 | 01 | 1 | | @0 Lecture notes in computer science |
---|
A66 | 01 | | | @0 DEU |
---|
C01 | 01 | | ENG | @0 The standard symbolic, deducibility-based notions of secrecy are in general insufficient from a cryptographic point of view, especially in presence of hash functions. In this paper we devise and motivate a more appropriate secrecy criterion which exactly captures a standard cryptographic notion of secrecy for protocols involving public-key enryption and hash functions: protocols that satisfy it are computationally secure while any violation of our criterion directly leads to an attack. Furthermore, we prove that our criterion is decidable via an NP decision procedure. Our results hold for standard security notions for encryption and hash functions modeled as random oracles. |
---|
C02 | 01 | X | | @0 001D02B07C |
---|
C02 | 02 | X | | @0 001D02A05 |
---|
C03 | 01 | X | FRE | @0 Informatique théorique @5 01 |
---|
C03 | 01 | X | ENG | @0 Computer theory @5 01 |
---|
C03 | 01 | X | SPA | @0 Informática teórica @5 01 |
---|
C03 | 02 | X | FRE | @0 Hachage @5 06 |
---|
C03 | 02 | X | ENG | @0 Hashing @5 06 |
---|
C03 | 02 | X | SPA | @0 Hashing @5 06 |
---|
C03 | 03 | X | FRE | @0 Cryptographie @5 07 |
---|
C03 | 03 | X | ENG | @0 Cryptography @5 07 |
---|
C03 | 03 | X | SPA | @0 Criptografía @5 07 |
---|
C03 | 04 | X | FRE | @0 Protocole transmission @5 08 |
---|
C03 | 04 | X | ENG | @0 Transmission protocol @5 08 |
---|
C03 | 04 | X | SPA | @0 Protocolo transmisión @5 08 |
---|
C03 | 05 | X | FRE | @0 Sécurité @5 09 |
---|
C03 | 05 | X | ENG | @0 Safety @5 09 |
---|
C03 | 05 | X | SPA | @0 Seguridad @5 09 |
---|
C03 | 06 | X | FRE | @0 Décidabilité @5 10 |
---|
C03 | 06 | X | ENG | @0 Decidability @5 10 |
---|
C03 | 06 | X | SPA | @0 Decidibilidad @5 10 |
---|
C03 | 07 | X | FRE | @0 Prise décision @5 11 |
---|
C03 | 07 | X | ENG | @0 Decision making @5 11 |
---|
C03 | 07 | X | SPA | @0 Toma decision @5 11 |
---|
C03 | 08 | X | FRE | @0 Cryptage @5 12 |
---|
C03 | 08 | X | ENG | @0 Encryption @5 12 |
---|
C03 | 08 | X | SPA | @0 Cifrado @5 12 |
---|
C03 | 09 | X | FRE | @0 Secret @5 18 |
---|
C03 | 09 | X | ENG | @0 Secrecy @5 18 |
---|
C03 | 09 | X | SPA | @0 Secreto @5 18 |
---|
C03 | 10 | X | FRE | @0 Clé publique @5 19 |
---|
C03 | 10 | X | ENG | @0 Public key @5 19 |
---|
C03 | 10 | X | SPA | @0 Llave pública @5 19 |
---|
C03 | 11 | X | FRE | @0 Oracle @5 20 |
---|
C03 | 11 | X | ENG | @0 Oracle @5 20 |
---|
C03 | 12 | X | FRE | @0 Fonction aléatoire @5 23 |
---|
C03 | 12 | X | ENG | @0 Random function @5 23 |
---|
C03 | 12 | X | SPA | @0 Función aleatoria @5 23 |
---|
C03 | 13 | X | FRE | @0 Modélisation @5 24 |
---|
C03 | 13 | X | ENG | @0 Modeling @5 24 |
---|
C03 | 13 | X | SPA | @0 Modelización @5 24 |
---|
N21 | | | | @1 344 |
---|
N44 | 01 | | | @1 OTO |
---|
N82 | | | | @1 OTO |
---|
|
pR |
A30 | 01 | 1 | ENG | @1 International Conference on the Foundations of Software Technology and Theoretical Computer Science @2 26 @3 Kolkata IND @4 2006 |
---|
|
Format Inist (serveur)
NO : | PASCAL 07-0531787 INIST |
ET : | Computationally sound symbolic secrecy in the presence of hash functions |
AU : | CORTIER (Véronique); KREMER (Steve); KUSTERS (Ralf); WARINSCHI (Bogdan); ARUN-KUMAR (S.); GARG (Naveen) |
AF : | Loria, CNRS & INRIA project Cassis/France (1 aut.); LSV, CNRS & ENS Cachan & INRIA project Secsi/France (2 aut.); ETH Zurich/Suisse (3 aut.); Loria, Univerité Henri Poincaré & INRIA project Cassis/France (4 aut.) |
DT : | Publication en série; Congrès; Niveau analytique |
SO : | Lecture notes in computer science; ISSN 0302-9743; Allemagne; Da. 2006; Vol. 4337; Pp. 176-187; Bibl. 16 ref. |
LA : | Anglais |
EA : | The standard symbolic, deducibility-based notions of secrecy are in general insufficient from a cryptographic point of view, especially in presence of hash functions. In this paper we devise and motivate a more appropriate secrecy criterion which exactly captures a standard cryptographic notion of secrecy for protocols involving public-key enryption and hash functions: protocols that satisfy it are computationally secure while any violation of our criterion directly leads to an attack. Furthermore, we prove that our criterion is decidable via an NP decision procedure. Our results hold for standard security notions for encryption and hash functions modeled as random oracles. |
CC : | 001D02B07C; 001D02A05 |
FD : | Informatique théorique; Hachage; Cryptographie; Protocole transmission; Sécurité; Décidabilité; Prise décision; Cryptage; Secret; Clé publique; Oracle; Fonction aléatoire; Modélisation |
ED : | Computer theory; Hashing; Cryptography; Transmission protocol; Safety; Decidability; Decision making; Encryption; Secrecy; Public key; Oracle; Random function; Modeling |
SD : | Informática teórica; Hashing; Criptografía; Protocolo transmisión; Seguridad; Decidibilidad; Toma decision; Cifrado; Secreto; Llave pública; Función aleatoria; Modelización |
LO : | INIST-16343.354000172801410180 |
ID : | 07-0531787 |
Links to Exploration step
Pascal:07-0531787
Le document en format XML
<record><TEI><teiHeader><fileDesc><titleStmt><title xml:lang="en" level="a">Computationally sound symbolic secrecy in the presence of hash functions</title>
<author><name sortKey="Cortier, Veronique" sort="Cortier, Veronique" uniqKey="Cortier V" first="Véronique" last="Cortier">Véronique Cortier</name>
<affiliation><inist:fA14 i1="01"><s1>Loria, CNRS & INRIA project Cassis</s1>
<s3>FRA</s3>
<sZ>1 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author><name sortKey="Kremer, Steve" sort="Kremer, Steve" uniqKey="Kremer S" first="Steve" last="Kremer">Steve Kremer</name>
<affiliation><inist:fA14 i1="02"><s1>LSV, CNRS & ENS Cachan & INRIA project Secsi</s1>
<s3>FRA</s3>
<sZ>2 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author><name sortKey="Kusters, Ralf" sort="Kusters, Ralf" uniqKey="Kusters R" first="Ralf" last="Kusters">Ralf Kusters</name>
<affiliation><inist:fA14 i1="03"><s1>ETH Zurich</s1>
<s3>CHE</s3>
<sZ>3 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author><name sortKey="Warinschi, Bogdan" sort="Warinschi, Bogdan" uniqKey="Warinschi B" first="Bogdan" last="Warinschi">Bogdan Warinschi</name>
<affiliation><inist:fA14 i1="04"><s1>Loria, Univerité Henri Poincaré & INRIA project Cassis</s1>
<s3>FRA</s3>
<sZ>4 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
</titleStmt>
<publicationStmt><idno type="wicri:source">INIST</idno>
<idno type="inist">07-0531787</idno>
<date when="2006">2006</date>
<idno type="stanalyst">PASCAL 07-0531787 INIST</idno>
<idno type="RBID">Pascal:07-0531787</idno>
<idno type="wicri:Area/PascalFrancis/Corpus">000382</idno>
</publicationStmt>
<sourceDesc><biblStruct><analytic><title xml:lang="en" level="a">Computationally sound symbolic secrecy in the presence of hash functions</title>
<author><name sortKey="Cortier, Veronique" sort="Cortier, Veronique" uniqKey="Cortier V" first="Véronique" last="Cortier">Véronique Cortier</name>
<affiliation><inist:fA14 i1="01"><s1>Loria, CNRS & INRIA project Cassis</s1>
<s3>FRA</s3>
<sZ>1 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author><name sortKey="Kremer, Steve" sort="Kremer, Steve" uniqKey="Kremer S" first="Steve" last="Kremer">Steve Kremer</name>
<affiliation><inist:fA14 i1="02"><s1>LSV, CNRS & ENS Cachan & INRIA project Secsi</s1>
<s3>FRA</s3>
<sZ>2 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author><name sortKey="Kusters, Ralf" sort="Kusters, Ralf" uniqKey="Kusters R" first="Ralf" last="Kusters">Ralf Kusters</name>
<affiliation><inist:fA14 i1="03"><s1>ETH Zurich</s1>
<s3>CHE</s3>
<sZ>3 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author><name sortKey="Warinschi, Bogdan" sort="Warinschi, Bogdan" uniqKey="Warinschi B" first="Bogdan" last="Warinschi">Bogdan Warinschi</name>
<affiliation><inist:fA14 i1="04"><s1>Loria, Univerité Henri Poincaré & INRIA project Cassis</s1>
<s3>FRA</s3>
<sZ>4 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
</analytic>
<series><title level="j" type="main">Lecture notes in computer science</title>
<idno type="ISSN">0302-9743</idno>
<imprint><date when="2006">2006</date>
</imprint>
</series>
</biblStruct>
</sourceDesc>
<seriesStmt><title level="j" type="main">Lecture notes in computer science</title>
<idno type="ISSN">0302-9743</idno>
</seriesStmt>
</fileDesc>
<profileDesc><textClass><keywords scheme="KwdEn" xml:lang="en"><term>Computer theory</term>
<term>Cryptography</term>
<term>Decidability</term>
<term>Decision making</term>
<term>Encryption</term>
<term>Hashing</term>
<term>Modeling</term>
<term>Oracle</term>
<term>Public key</term>
<term>Random function</term>
<term>Safety</term>
<term>Secrecy</term>
<term>Transmission protocol</term>
</keywords>
<keywords scheme="Pascal" xml:lang="fr"><term>Informatique théorique</term>
<term>Hachage</term>
<term>Cryptographie</term>
<term>Protocole transmission</term>
<term>Sécurité</term>
<term>Décidabilité</term>
<term>Prise décision</term>
<term>Cryptage</term>
<term>Secret</term>
<term>Clé publique</term>
<term>Oracle</term>
<term>Fonction aléatoire</term>
<term>Modélisation</term>
</keywords>
</textClass>
</profileDesc>
</teiHeader>
<front><div type="abstract" xml:lang="en">The standard symbolic, deducibility-based notions of secrecy are in general insufficient from a cryptographic point of view, especially in presence of hash functions. In this paper we devise and motivate a more appropriate secrecy criterion which exactly captures a standard cryptographic notion of secrecy for protocols involving public-key enryption and hash functions: protocols that satisfy it are computationally secure while any violation of our criterion directly leads to an attack. Furthermore, we prove that our criterion is decidable via an NP decision procedure. Our results hold for standard security notions for encryption and hash functions modeled as random oracles.</div>
</front>
</TEI>
<inist><standard h6="B"><pA><fA01 i1="01" i2="1"><s0>0302-9743</s0>
</fA01>
<fA05><s2>4337</s2>
</fA05>
<fA08 i1="01" i2="1" l="ENG"><s1>Computationally sound symbolic secrecy in the presence of hash functions</s1>
</fA08>
<fA09 i1="01" i2="1" l="ENG"><s1>FSTTCS 2006 : foundations of software technology and theoretical computer science : 26th International conference, Kolkata, India, December 13-15, 2006 : proceedings</s1>
</fA09>
<fA11 i1="01" i2="1"><s1>CORTIER (Véronique)</s1>
</fA11>
<fA11 i1="02" i2="1"><s1>KREMER (Steve)</s1>
</fA11>
<fA11 i1="03" i2="1"><s1>KUSTERS (Ralf)</s1>
</fA11>
<fA11 i1="04" i2="1"><s1>WARINSCHI (Bogdan)</s1>
</fA11>
<fA12 i1="01" i2="1"><s1>ARUN-KUMAR (S.)</s1>
<s9>ed.</s9>
</fA12>
<fA12 i1="02" i2="1"><s1>GARG (Naveen)</s1>
<s9>ed.</s9>
</fA12>
<fA14 i1="01"><s1>Loria, CNRS & INRIA project Cassis</s1>
<s3>FRA</s3>
<sZ>1 aut.</sZ>
</fA14>
<fA14 i1="02"><s1>LSV, CNRS & ENS Cachan & INRIA project Secsi</s1>
<s3>FRA</s3>
<sZ>2 aut.</sZ>
</fA14>
<fA14 i1="03"><s1>ETH Zurich</s1>
<s3>CHE</s3>
<sZ>3 aut.</sZ>
</fA14>
<fA14 i1="04"><s1>Loria, Univerité Henri Poincaré & INRIA project Cassis</s1>
<s3>FRA</s3>
<sZ>4 aut.</sZ>
</fA14>
<fA20><s1>176-187</s1>
</fA20>
<fA21><s1>2006</s1>
</fA21>
<fA23 i1="01"><s0>ENG</s0>
</fA23>
<fA26 i1="01"><s0>3-540-49994-6</s0>
</fA26>
<fA43 i1="01"><s1>INIST</s1>
<s2>16343</s2>
<s5>354000172801410180</s5>
</fA43>
<fA44><s0>0000</s0>
<s1>© 2007 INIST-CNRS. All rights reserved.</s1>
</fA44>
<fA45><s0>16 ref.</s0>
</fA45>
<fA47 i1="01" i2="1"><s0>07-0531787</s0>
</fA47>
<fA60><s1>P</s1>
<s2>C</s2>
</fA60>
<fA64 i1="01" i2="1"><s0>Lecture notes in computer science</s0>
</fA64>
<fA66 i1="01"><s0>DEU</s0>
</fA66>
<fC01 i1="01" l="ENG"><s0>The standard symbolic, deducibility-based notions of secrecy are in general insufficient from a cryptographic point of view, especially in presence of hash functions. In this paper we devise and motivate a more appropriate secrecy criterion which exactly captures a standard cryptographic notion of secrecy for protocols involving public-key enryption and hash functions: protocols that satisfy it are computationally secure while any violation of our criterion directly leads to an attack. Furthermore, we prove that our criterion is decidable via an NP decision procedure. Our results hold for standard security notions for encryption and hash functions modeled as random oracles.</s0>
</fC01>
<fC02 i1="01" i2="X"><s0>001D02B07C</s0>
</fC02>
<fC02 i1="02" i2="X"><s0>001D02A05</s0>
</fC02>
<fC03 i1="01" i2="X" l="FRE"><s0>Informatique théorique</s0>
<s5>01</s5>
</fC03>
<fC03 i1="01" i2="X" l="ENG"><s0>Computer theory</s0>
<s5>01</s5>
</fC03>
<fC03 i1="01" i2="X" l="SPA"><s0>Informática teórica</s0>
<s5>01</s5>
</fC03>
<fC03 i1="02" i2="X" l="FRE"><s0>Hachage</s0>
<s5>06</s5>
</fC03>
<fC03 i1="02" i2="X" l="ENG"><s0>Hashing</s0>
<s5>06</s5>
</fC03>
<fC03 i1="02" i2="X" l="SPA"><s0>Hashing</s0>
<s5>06</s5>
</fC03>
<fC03 i1="03" i2="X" l="FRE"><s0>Cryptographie</s0>
<s5>07</s5>
</fC03>
<fC03 i1="03" i2="X" l="ENG"><s0>Cryptography</s0>
<s5>07</s5>
</fC03>
<fC03 i1="03" i2="X" l="SPA"><s0>Criptografía</s0>
<s5>07</s5>
</fC03>
<fC03 i1="04" i2="X" l="FRE"><s0>Protocole transmission</s0>
<s5>08</s5>
</fC03>
<fC03 i1="04" i2="X" l="ENG"><s0>Transmission protocol</s0>
<s5>08</s5>
</fC03>
<fC03 i1="04" i2="X" l="SPA"><s0>Protocolo transmisión</s0>
<s5>08</s5>
</fC03>
<fC03 i1="05" i2="X" l="FRE"><s0>Sécurité</s0>
<s5>09</s5>
</fC03>
<fC03 i1="05" i2="X" l="ENG"><s0>Safety</s0>
<s5>09</s5>
</fC03>
<fC03 i1="05" i2="X" l="SPA"><s0>Seguridad</s0>
<s5>09</s5>
</fC03>
<fC03 i1="06" i2="X" l="FRE"><s0>Décidabilité</s0>
<s5>10</s5>
</fC03>
<fC03 i1="06" i2="X" l="ENG"><s0>Decidability</s0>
<s5>10</s5>
</fC03>
<fC03 i1="06" i2="X" l="SPA"><s0>Decidibilidad</s0>
<s5>10</s5>
</fC03>
<fC03 i1="07" i2="X" l="FRE"><s0>Prise décision</s0>
<s5>11</s5>
</fC03>
<fC03 i1="07" i2="X" l="ENG"><s0>Decision making</s0>
<s5>11</s5>
</fC03>
<fC03 i1="07" i2="X" l="SPA"><s0>Toma decision</s0>
<s5>11</s5>
</fC03>
<fC03 i1="08" i2="X" l="FRE"><s0>Cryptage</s0>
<s5>12</s5>
</fC03>
<fC03 i1="08" i2="X" l="ENG"><s0>Encryption</s0>
<s5>12</s5>
</fC03>
<fC03 i1="08" i2="X" l="SPA"><s0>Cifrado</s0>
<s5>12</s5>
</fC03>
<fC03 i1="09" i2="X" l="FRE"><s0>Secret</s0>
<s5>18</s5>
</fC03>
<fC03 i1="09" i2="X" l="ENG"><s0>Secrecy</s0>
<s5>18</s5>
</fC03>
<fC03 i1="09" i2="X" l="SPA"><s0>Secreto</s0>
<s5>18</s5>
</fC03>
<fC03 i1="10" i2="X" l="FRE"><s0>Clé publique</s0>
<s5>19</s5>
</fC03>
<fC03 i1="10" i2="X" l="ENG"><s0>Public key</s0>
<s5>19</s5>
</fC03>
<fC03 i1="10" i2="X" l="SPA"><s0>Llave pública</s0>
<s5>19</s5>
</fC03>
<fC03 i1="11" i2="X" l="FRE"><s0>Oracle</s0>
<s5>20</s5>
</fC03>
<fC03 i1="11" i2="X" l="ENG"><s0>Oracle</s0>
<s5>20</s5>
</fC03>
<fC03 i1="12" i2="X" l="FRE"><s0>Fonction aléatoire</s0>
<s5>23</s5>
</fC03>
<fC03 i1="12" i2="X" l="ENG"><s0>Random function</s0>
<s5>23</s5>
</fC03>
<fC03 i1="12" i2="X" l="SPA"><s0>Función aleatoria</s0>
<s5>23</s5>
</fC03>
<fC03 i1="13" i2="X" l="FRE"><s0>Modélisation</s0>
<s5>24</s5>
</fC03>
<fC03 i1="13" i2="X" l="ENG"><s0>Modeling</s0>
<s5>24</s5>
</fC03>
<fC03 i1="13" i2="X" l="SPA"><s0>Modelización</s0>
<s5>24</s5>
</fC03>
<fN21><s1>344</s1>
</fN21>
<fN44 i1="01"><s1>OTO</s1>
</fN44>
<fN82><s1>OTO</s1>
</fN82>
</pA>
<pR><fA30 i1="01" i2="1" l="ENG"><s1>International Conference on the Foundations of Software Technology and Theoretical Computer Science</s1>
<s2>26</s2>
<s3>Kolkata IND</s3>
<s4>2006</s4>
</fA30>
</pR>
</standard>
<server><NO>PASCAL 07-0531787 INIST</NO>
<ET>Computationally sound symbolic secrecy in the presence of hash functions</ET>
<AU>CORTIER (Véronique); KREMER (Steve); KUSTERS (Ralf); WARINSCHI (Bogdan); ARUN-KUMAR (S.); GARG (Naveen)</AU>
<AF>Loria, CNRS & INRIA project Cassis/France (1 aut.); LSV, CNRS & ENS Cachan & INRIA project Secsi/France (2 aut.); ETH Zurich/Suisse (3 aut.); Loria, Univerité Henri Poincaré & INRIA project Cassis/France (4 aut.)</AF>
<DT>Publication en série; Congrès; Niveau analytique</DT>
<SO>Lecture notes in computer science; ISSN 0302-9743; Allemagne; Da. 2006; Vol. 4337; Pp. 176-187; Bibl. 16 ref.</SO>
<LA>Anglais</LA>
<EA>The standard symbolic, deducibility-based notions of secrecy are in general insufficient from a cryptographic point of view, especially in presence of hash functions. In this paper we devise and motivate a more appropriate secrecy criterion which exactly captures a standard cryptographic notion of secrecy for protocols involving public-key enryption and hash functions: protocols that satisfy it are computationally secure while any violation of our criterion directly leads to an attack. Furthermore, we prove that our criterion is decidable via an NP decision procedure. Our results hold for standard security notions for encryption and hash functions modeled as random oracles.</EA>
<CC>001D02B07C; 001D02A05</CC>
<FD>Informatique théorique; Hachage; Cryptographie; Protocole transmission; Sécurité; Décidabilité; Prise décision; Cryptage; Secret; Clé publique; Oracle; Fonction aléatoire; Modélisation</FD>
<ED>Computer theory; Hashing; Cryptography; Transmission protocol; Safety; Decidability; Decision making; Encryption; Secrecy; Public key; Oracle; Random function; Modeling</ED>
<SD>Informática teórica; Hashing; Criptografía; Protocolo transmisión; Seguridad; Decidibilidad; Toma decision; Cifrado; Secreto; Llave pública; Función aleatoria; Modelización</SD>
<LO>INIST-16343.354000172801410180</LO>
<ID>07-0531787</ID>
</server>
</inist>
</record>
Pour manipuler ce document sous Unix (Dilib)
EXPLOR_STEP=$WICRI_ROOT/Wicri/Lorraine/explor/InforLorV4/Data/PascalFrancis/Corpus
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 000382 | SxmlIndent | more
Ou
HfdSelect -h $EXPLOR_AREA/Data/PascalFrancis/Corpus/biblio.hfd -nk 000382 | SxmlIndent | more
Pour mettre un lien sur cette page dans le réseau Wicri
{{Explor lien
|wiki= Wicri/Lorraine
|area= InforLorV4
|flux= PascalFrancis
|étape= Corpus
|type= RBID
|clé= Pascal:07-0531787
|texte= Computationally sound symbolic secrecy in the presence of hash functions
}}
| This area was generated with Dilib version V0.6.33. Data generation: Mon Jun 10 21:56:28 2019. Site generation: Fri Feb 25 15:29:27 2022 | |