Security-preserving asymmetric protocol encapsulation

作者: Raphael C. -W. Phan , Serge Vaudenay

DOI: 10.1007/978-3-540-76788-6_28

关键词:

摘要: Query-response based protocols between a client and server such as SSL, TLS, SSH are asymmetric in the sense that querying responding play different roles, for which there is need two-way linkability queries responses within protocol. We motivated by observation though results exist other related contexts, no provably secure scheme has been applied to setting of client-server protocols, differ from conventional communications on above points. show how communication these setting. In doing so, we propose new primitive: query-response encapsulation scheme; give an instantiation, demonstrate this primitive can be used our purpose. proof encapsulation, preserve notion "local-security".

参考文章(37)
Aggelos Kiayias, Moti Yung, Self Protecting Pirates and Black-Box Traitor Tracing international cryptology conference. pp. 63- 79 ,(2001) , 10.1007/3-540-44647-8_4
R. Canetti, Universally composable security: a new paradigm for cryptographic protocols international conference on cluster computing. pp. 136- 145 ,(2001) , 10.1109/SFCS.2001.959888
Christoph Krauß, Frederic Stumpf, Claudia Eckert, Detecting node compromise in hybrid wireless sensor networks using attestation techniques security of ad hoc and sensor networks. pp. 203- 217 ,(2007) , 10.1007/978-3-540-73275-4_15
Chris J. Mitchell, Adrian Leung, Ninja: non identity based, privacy preserving authentication for ubiquitous environments ubiquitous computing. pp. 73- 90 ,(2007) , 10.5555/1771592.1771597
Hugo Krawczyk, The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?) international cryptology conference. ,vol. 2001, pp. 310- 331 ,(2001) , 10.1007/3-540-44647-8_19
Philip Karlton, Alan Freier, Paul Kocher, The SSL Protocol Version 3.0 draft-freier-ssl-version3-02.txt. ,(1996)
Charles Rackoff, Daniel R. Simon, Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack international cryptology conference. pp. 433- 444 ,(1991) , 10.1007/3-540-46766-1_35
Aggelos Kiayias, Moti Yung, Traitor Tracing with Constant Transmission Rate international cryptology conference. pp. 450- 465 ,(2002) , 10.1007/3-540-46035-7_30
T. Dierks, C. Allen, The TLS Protocol Version 1.0 IETF RFC 2246. ,vol. 2246, pp. 1- 80 ,(1999)
Phillip Rogaway, Thomas Shrimpton, A Provable-Security Treatment of the Key-Wrap Problem Advances in Cryptology - EUROCRYPT 2006. pp. 373- 390 ,(2006) , 10.1007/11761679_23