A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
[chapter]
2001
Lecture Notes in Computer Science
We present a formalism for the analysis of key-exchange protocols that combines previous definitional approaches and results in a definition of security that enjoys some important analytical benefits: (i) any key-exchange protocol that satisfies the security definition can be composed with symmetric encryption and authentication functions to provide provably secure communication channels (as defined here); and (ii) the definition allows for simple modular proofs of security: one can design and
doi:10.1007/3-540-44987-6_28
fatcat:3dgqlk7rmzh6hgair42kimnwbm