Back to Results
First PageMeta Content
Dolev-Yao model / Public-key cryptography / Protocol composition logic / XTR / Cryptographic primitive / Semantic security / Secure channel / Key-agreement protocol / Commitment scheme / Cryptography / Cryptographic protocols / Ciphertext indistinguishability


Computationally sound compositional logic for key exchange protocols ∗ Anupam Datta, Ante Derek, John C. Mitchell Dept. Computer Science, Stanford University {danupam, aderek, mitchell}@cs.stanford.edu Abstract
Add to Reading List

Document Date: 2007-12-18 00:37:13


Open Document

File Size: 198,81 KB

Share Result on Facebook

Company

Computational PCL / /

/

Event

FDA Phase / /

Facility

Stanford University / /

IndustryTerm

non-interactive algorithm / good secure session protocol / good key exchange protocol / composite protocol / illustrative sample protocol / local area networks / bilistic polynomial-time algorithm / secure session protocol / important protocols / secure sessions protocol / subsequent key usage protocol / secure Internet transactions / logical proofs involving key exchange protocols / larger practical protocols / wireless local area networks / protocol suites involving key exchange protocols / security protocols / /

Organization

National Science Foundation / Stanford University / /

Person

John C. Mitchell / A. Every / Anupam Datta / /

Position

standard IND-CPA / IND-CPA / underlying IND-CPA / representative / analyst / Private / /

Product

S0 / Y / CCA2 / ISO-9798-3 / Yˆ / CCA1 / CCA-2 / ISO-97983 / /

SportsLeague

Stanford University / /

Technology

secure session protocol / ISO-9798-3 key exchange protocol / protocol suites involving key exchange protocols / QSS protocol / key exchange protocol / non-interactive algorithm / example protocol / PKI / key exchange protocols / QISO protocol / private key / two protocols / application protocol / SSL / illustrative sample protocol / one-message protocol / important protocols / resulting protocol / encryption / good key exchange protocol / application protocols / cryptography / bilistic polynomial-time algorithm / good secure session protocol / logical proofs involving key exchange protocols / 4 Protocol / public key / interesting security protocols / composite protocol / 3 Modeling Protocols / exchange protocols / 3 protocol / 1 Introduction Key exchange protocols / subsequent key usage protocol / protocol QSS protocol / secure sessions protocol / simulation / digital signature / local area networks / ISO-9798-3 protocol / modeling symmetric encryption / accomplished using a key exchange protocol / /

SocialTag