...
首页> 外文期刊>SIGACT News >Security and Composition of Cryptographic Protocols: A Tutorial - Part I
【24h】

Security and Composition of Cryptographic Protocols: A Tutorial - Part I

机译:加密协议的安全性和组成:教程-第一部分

获取原文
获取原文并翻译 | 示例
           

摘要

What does it mean for a cryptographic protocol to be "secure"? Capturing the security requirements of cryptographic tasks in a meaningful way is a slippery business: On the one hand, we want security criteria that prevent "all potential attacks" against a protocol; on the other hand, we want our criteria not to be overly restrictive and accept "reasonable protocols". One of the main reasons for flaws is the often unexpected interactions among different protocol instances that run alongside each other in a composite system. This tutorial studies a general methodology for defining security of cryptographic protocols. The methodology, often dubbed the "trusted party paradigm", allows for defining the security requirements of a large variety of cryptographic tasks in a unified and natural way. We first review more basic formulations that capture security in isolation from other protocol instances. Next we address the security problems associated with protocol composition, and review formulations that guarantee security even in composite systems.
机译:加密协议“安全”是什么意思?以有意义的方式捕获加密任务的安全要求是一项艰巨的任务:一方面,我们需要能够防止对协议进行“所有潜在攻击”的安全标准;另一方面,我们希望我们的标准不要过于严格,并接受“合理的协议”。造成缺陷的主要原因之一是在复合系统中并排运行的不同协议实例之间经常发生意外交互。本教程研究了定义密码协议安全性的通用方法。该方法通常被称为“受托方范例”,它允许以统一自然的方式定义各种加密任务的安全要求。我们首先回顾一些更基本的描述,这些描述将安全性与其他协议实例隔离开来。接下来,我们解决与协议组成相关的安全性问题,并回顾即使在复合系统中也能保证安全性的公式。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号