File Download
There are no files associated with this item.
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Article: Provable security for cryptographic protocols - exact analysis and engineering applications
Title | Provable security for cryptographic protocols - exact analysis and engineering applications |
---|---|
Authors | |
Issue Date | 1998 |
Publisher | I O S Press. The Journal's web site is located at http://www.iospress.nl/html/09266801.php |
Citation | Journal Of Computer Security, 1998, v. 6 n. 1-2, p. 23-52 How to Cite? |
Abstract | We develop an approach to deriving concrete engineering advice for cryptographic protocols from provable-security-style proofs of security. The approach is illustrated with a simple, yet useful protocol. Our main result provides the first published proof of an exact probabilistic relationship between a high-level protocol and multiple cryptographic primitives. This exact relationship enables us to rigorously derive concrete recommendations on the bitlengths of cryptographic keys and on how often principals should rekey. As an additional benefit of our approach, the process of developing our theorem and proof lead us to identify and implement an improvement in our example protocol. |
Persistent Identifier | http://hdl.handle.net/10722/155062 |
ISSN | 2023 Impact Factor: 0.9 2023 SCImago Journal Rankings: 0.340 |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Gray Iii, James W | en_US |
dc.contributor.author | Epsilon Ip, Kin Fai | en_US |
dc.contributor.author | Lui, KingShan | en_US |
dc.date.accessioned | 2012-08-08T08:31:42Z | - |
dc.date.available | 2012-08-08T08:31:42Z | - |
dc.date.issued | 1998 | en_US |
dc.identifier.citation | Journal Of Computer Security, 1998, v. 6 n. 1-2, p. 23-52 | en_US |
dc.identifier.issn | 0926-227X | en_US |
dc.identifier.uri | http://hdl.handle.net/10722/155062 | - |
dc.description.abstract | We develop an approach to deriving concrete engineering advice for cryptographic protocols from provable-security-style proofs of security. The approach is illustrated with a simple, yet useful protocol. Our main result provides the first published proof of an exact probabilistic relationship between a high-level protocol and multiple cryptographic primitives. This exact relationship enables us to rigorously derive concrete recommendations on the bitlengths of cryptographic keys and on how often principals should rekey. As an additional benefit of our approach, the process of developing our theorem and proof lead us to identify and implement an improvement in our example protocol. | en_US |
dc.language | eng | en_US |
dc.publisher | I O S Press. The Journal's web site is located at http://www.iospress.nl/html/09266801.php | en_US |
dc.relation.ispartof | Journal of Computer Security | en_US |
dc.title | Provable security for cryptographic protocols - exact analysis and engineering applications | en_US |
dc.type | Article | en_US |
dc.identifier.email | Lui, KingShan:kslui@eee.hku.hk | en_US |
dc.identifier.authority | Lui, KingShan=rp00188 | en_US |
dc.description.nature | link_to_subscribed_fulltext | en_US |
dc.identifier.scopus | eid_2-s2.0-0031620598 | en_US |
dc.identifier.volume | 6 | en_US |
dc.identifier.issue | 1-2 | en_US |
dc.identifier.spage | 23 | en_US |
dc.identifier.epage | 52 | en_US |
dc.publisher.place | Netherlands | en_US |
dc.identifier.scopusauthorid | Gray III, James W=7404300433 | en_US |
dc.identifier.scopusauthorid | Epsilon Ip, Kin Fai=6507892891 | en_US |
dc.identifier.scopusauthorid | Lui, KingShan=7103390016 | en_US |
dc.identifier.issnl | 0926-227X | - |