Completing the Picture: Soundness of Formal Encryption in the Presence of Active Adversaries [chapter]

Romain Janvier, Yassine Lakhnech, Laurent Mazaré
2005 Lecture Notes in Computer Science  
In this paper, we extend previous results relating the Dolev-Yao model and the computational model. We add the possibility to exchange keys and consider cryptographic primitives such as signature. This work can be applied to check protocols in the computational model by using automatic verification tools in the formal model. To obtain this result, we introduce a precise definition for security criteria which leads to a nice reduction theorem. The reduction theorem is of interest on its own as
more » ... seems to be a powerful tool for proving equivalences between security criteria. Also, the proof of this theorem uses original ideas that seem to be applicable in other situations.
doi:10.1007/978-3-540-31987-0_13 fatcat:qwo4enitp5e5nlpg5vziokb37e