A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Authenticated Diffe-Hellman Key Agreement Protocols
[chapter]
1999
Lecture Notes in Computer Science
The practical and provable security aspects of these protocols are discussed. ...
This paper surveys recent work on the design and analysis of key agreement protocols that are based on the intractability of the Diffie-Hellman problem. ...
(Exact security is a concrete quantification of the security guaranteed by a protocol in terms of the perceived security of the underlying cryptographic primitives, e.g., the Diffie-Hellman problem or ...
doi:10.1007/3-540-48892-8_26
fatcat:akczicmnxfbn5p6qvsirvnfune
Secure Cloud Storage Service with an Efficient DOKS Protocol
2013
2013 IEEE International Conference on Services Computing
provably strong privacy for both users and cloud storage service providers. ...
Cryptographic cloud storage and search over encrypted data have attracted attentions from both industry and academics. ...
This work is partially sponsored by grants from NSF NetSE program, SaTC program, IBM faculty award and Intel ISTC on Cloud Computing. ...
doi:10.1109/scc.2013.37
dblp:conf/IEEEscc/JiangL13
fatcat:bsrwwpbq5rdtjjapydgy4c2rpy
How to Evaluate the Security of Real-Life Cryptographic Protocols?
[chapter]
2010
Lecture Notes in Computer Science
Governments and international standards bodies have established certification procedures for security-critical technologies, such as cryptographic algorithms. ...
Such standards have not yet been established for cryptographic protocols and hence it is difficult for users of these protocols to know whether they are trustworthy. ...
These tools have become increasingly mature in recent years and can now provide a fine-grained analysis of the security of cryptographic protocols, which is lacking in less-principled engineering methods ...
doi:10.1007/978-3-642-14992-4_16
fatcat:tywbtwtxmndxzi4mbomwryprvu
Cryptographic protocol logic: Satisfaction for (timed) Dolev–Yao cryptography
2008
The Journal of Logic and Algebraic Programming
Namely, the security of communication (as opposed to security of storage) and cryptographic protocols (as opposed to cryptographic operators). The logical concepts explored are the following. ...
Cryptographic Protocol Logic). ...
Acknowledgements I would like to thank Sergei Artëmov, Mika Cohen, Ralf Küsters, and Lawrence Moss for their valuable criticism. ...
doi:10.1016/j.jlap.2008.05.005
fatcat:pt4btsr36je7ddyjt6q3m6pzrm
A protocol for property-based attestation
2006
Proceedings of the first ACM workshop on Scalable trusted computing - STC '06
We prove the security of this protocol under the strong RSA assumption and the discrete logarithm assumption in the random oracle model. ...
However, as pointed out recently, the binary attestation has some shortcomings, in particular when used for applications: First, it reveals information about the configuration of a platform (hardware and ...
We propose a provably secure protocol for property-based attestation that concretely implements the delegation-based solution sketched above. ...
doi:10.1145/1179474.1179479
dblp:conf/ccs/ChenLLRSS06
fatcat:eahxthe3qfb77kbrhhnjddmyzy
Towards computationally sound symbolic analysis of key exchange protocols
2005
Proceedings of the 2005 ACM workshop on Formal methods in security engineering - FMSE '05
We present a cryptographically sound formal method for proving correctness of key exchange protocols. Our main tool is a fragment of a symbolic protocol logic. ...
We illustrate our method by constructing a proof of security for a simple authenticated Diffie-Hellman protocol. ...
Design and analysis of provably correct key exchange protocols has a long history [8, 22, 7, 9, 6, 34, 15, 16] . ...
doi:10.1145/1103576.1103580
dblp:conf/ccs/GuptaS05
fatcat:52xu4y4fkbfpfprwenwon3vaia
Privacy-preserving wildcards pattern matching protocol for IoT applications
2019
IEEE Access
In addition, our protocol also supports query with wildcards which can be used for the batch search. This protocol is provable-secure against honest-but-curious adversaries. ...
There are a lot of studies on privacy-preserving pattern matching protocols, but most protocols are constructed using heavy public-key cryptographic operations, which are not applicable to IoT devices. ...
His primary interest includes public key cryptography, in particular, designing cryptographic primitives and provable security. ...
doi:10.1109/access.2019.2900519
fatcat:gylkehwmpjgyvbawes3odz4gci
Formal verification of security protocol implementations: a survey
2012
Formal Aspects of Computing
The two main approaches of model extraction and code generation are presented, along with the main techniques adopted for each approach. ...
Automated formal verification of security protocols has been mostly focused on analyzing highlevel abstract models which, however, are significantly different from real protocol implementations written ...
models and analysis of different security properties. ...
doi:10.1007/s00165-012-0269-9
fatcat:z7bgh5nnuzh4leo7wgf5rwd5ci
Establishing and fixing a freshness flaw in a key-distribution and Authentication Protocol
2008
2008 4th International Conference on Intelligent Computer Communication and Processing
Cryptographic protocols are used to provide security services such as confidentiality, message integrity, authentication, certified E-mail and non-repudiation. ...
The security of electronic networks and information systems is nowadays seen as a critical issue for the growth of Information and Communication Technologies. ...
Cryptographic security protocols are widely used for the secure delivery of data over mobile and fixed networks. ...
doi:10.1109/iccp.2008.4648371
fatcat:mywdwionanhixc55yohbl3baau
A Survey on Security and Privacy Protocols for Cognitive Wireless Sensor Networks
[article]
2013
arXiv
pre-print
Since in many WSN applications, lives and livelihoods may depend on the timeliness and correctness of sensor data obtained from dispersed sensor nodes, these networks must be secured to prevent any possible ...
Wireless sensor networks have emerged as an important and new area in wireless and mobile computing research because of their numerous potential applications that range from indoor deployment scenarios ...
Kumar Nayak of National Institute of Science and Technology (NIST), Odisha, India. ...
arXiv:1308.0682v1
fatcat:zkwd6kpgkjaojhxkupzpggo67e
A secure and lightweight scheme for media keying in the session initiation protocol (SIP)
2010
Principles, Systems and Applications of IP Telecommunications on - IPTComm '10
We first briefly survey the two IETF SIP media keying protocols -SDES and DTLS-SRTP -and evaluate them against a core feature set. ...
At the same time, it provides significantly better security than SDES and is only slightly weaker than the non-PKI version of DTLS-SRTP. ...
Such adversaries are standard in cryptographic design and analysis of key exchange protocols [5, 20, 12, 13] . ...
doi:10.1145/1941530.1941535
dblp:conf/iptcomm/GurbaniK10
fatcat:wndq6y5pavez5c42dwmgxll7ou
Some Physics And System Issues In The Security Analysis Of Quantum Key Distribution Protocols
[article]
2014
arXiv
pre-print
It is shown that the cryptosystem representation itself may miss out many possible attacks which are not accounted for in the security analysis and proofs. ...
Hence the final security claims drawn from such analysis are not reliable, apart from foundational issues about the security criteria that are discussed elsewhere. ...
ACKNOWLEDGMENT The work reported in this article was supported by the Air Force Office of Scientific Research and the Defense Advanced Research Project Agency. ...
arXiv:1405.1683v1
fatcat:k6n4weseq5grngfhyapyjumwbq
Establishing and Fixing Security Protocols Weaknesses Using a Logic-based Verification Tool
2013
Journal of Communications
Abstract-Formal verification aims at providing a rigid and thorough means of evaluating the correctness of security protocols and also establishing that the protocols are free of weaknesses that can ...
The verification tool with attack detection capabilities is introduced, and the verification process is demonstrated by way of a case study on two published security protocols that provide mutual authentication ...
The design of provably correct security protocols is complex and highly prone to error. ...
doi:10.12720/jcm.8.11.795-805
fatcat:cok5aynveff2ffiuv3256sivom
A Mutual Authentication and Cross Verification Protocol for Securing Internet-of-Drones (IoD)
2022
Computers Materials & Continua
The proposed protocol's security analysis section has been conducted formally using BAN (Burrows-Abadi-Needham) logic, ProVerif2.03 simulation, and informally using discussion/pragmatic illustration. ...
Upon comparing the proposed protocol with prior works, it has been demonstrated that it is efficient and effective and recommended for practical implementation in the IoD environment. ...
Acknowledgement: The authors would like to express their sincere thanks to the University of Bisha, Bisha, Saudi Arabia, for the support provided during the research. ...
doi:10.32604/cmc.2022.026179
fatcat:jdgoq64wwvb7zdjimeol3g5qrm
A Privacy-Preserving, Mutual PUF-Based Authentication Protocol
2016
Cryptography
This enables the development of an efficient authentication protocol that provides both privacy and mutual authentication. ...
The security properties of the protocol are analyzed using data collected from a set of Xilinx Zynq FPGAs. ...
of the strong PUF and (4) resilience to protocol attacks. ...
doi:10.3390/cryptography1010003
fatcat:4wnut7kpbffkzizimcru6pcqci
« Previous
Showing results 1 — 15 out of 997 results