On the Relationships Between Notions of Simulation-Based Security

作者: Ralf Küsters , Anupam Datta , John C Mitchell , Ajith Ramanathan , None

DOI: 10.1007/978-3-540-30576-7_26

关键词: Logical formSimulation basedDistributed computingComputer scienceProtocol (object-oriented programming)Theoretical computer scienceComputational complexity theoryUniversal composabilityPosition (vector)Ideal (set theory)Process (engineering)

摘要: … The proofs of equivalence and implication between security … of security notions, including all variants of SS, SBB, WBB, and UC discussed in this paper. Our results about these security …

参考文章(26)
Michael Waidner, Birgit Pfitzmann, Michael Backes, Secure Asynchronous Reactive Systems ,(2004)
Dennis Hofheinz, Dominique Unruh, Comparing Two Notions of Simulatability Theory of Cryptography. pp. 86- 103 ,(2005) , 10.1007/978-3-540-30576-7_6
R. Canetti, Universally composable security: a new paradigm for cryptographic protocols international conference on cluster computing. pp. 136- 145 ,(2001) , 10.1109/SFCS.2001.959888
Robin Milner, Communication and Concurrency ,(1989)
Michael Backes, Birgit Pfitzmann, Michael Waidner, A general composition theorem for secure reactive systems theory of cryptography conference. pp. 336- 354 ,(2004) , 10.1007/978-3-540-24638-1_19
P. Lincoln, J. Mitchell, M. Mitchell, A. Scedrovy, Probabilistic Polynomial-Time Equivalence and Security Analysis formal methods. pp. 776- 793 ,(1999) , 10.1007/3-540-48119-2_43
Martı́n Abadi, Andrew D. Gordon, A calculus for cryptographic protocols Information & Computation. ,vol. 148, pp. 1- 70 ,(1999) , 10.1006/INCO.1998.2740
Martin Abadi, Andrew D. Gordon, A bisimulation method for cryptographic protocols european symposium on programming. ,vol. 5, pp. 12- 26 ,(1998) , 10.1007/BFB0053560
Ran Canetti, Eyal Kushilevitz, Yehuda Lindell, On the limitations of universally composable two-party computation without set-up assumptions theory and application of cryptographic techniques. pp. 68- 86 ,(2003) , 10.1007/3-540-39200-9_5
Ajith Ramanathan, John Mitchell, Andre Scedrov, Vanessa Teague, Probabilistic Bisimulation and Equivalence for Security Analysis of Network Protocols foundations of software science and computation structure. pp. 468- 483 ,(2004) , 10.1007/978-3-540-24727-2_33