Paper 2005/020

(De)Compositions of Cryptographic Schemes and their Applications to Protocols

R. Janvier, Y. Lakhnech, and L. Mazare

Abstract

The main result of this paper is that the Dolev-Yao model is a safe abstraction of the computational model for security protocols including those that combine asymmetric and symmetric encryption, signature and hashing. Moreover, message forwarding and private key transmission are allowed. To our knowledge this is the first result that deals with hash functions and the combination of these cryptographic primitives. A key step towards this result is a general definition of correction of cryptographic primitives, that unifies well known correctness criteria such as IND-CPA, IND-CCA, unforgeability etc.... and a theorem that allows to reduce the correctness of a composition of two cryptographic schemes to the correctness of each one.

Note: This revision includes a new simplified proof of the reduction theorem.

Metadata
Available format(s)
PDF PS
Category
Cryptographic protocols
Publication info
Published elsewhere. Unpublished
Keywords
SecurityCryptographic ProtocolsFormal EncryptionProbabilistic EncryptionDolev-Yao ModelComputational Model
Contact author(s)
laurent mazare @ imag fr
History
2005-06-10: last of 3 revisions
2005-02-01: received
See all versions
Short URL
https://ia.cr/2005/020
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2005/020,
      author = {R.  Janvier and Y.  Lakhnech and L.  Mazare},
      title = {(De)Compositions of Cryptographic Schemes and their Applications to Protocols},
      howpublished = {Cryptology ePrint Archive, Paper 2005/020},
      year = {2005},
      note = {\url{https://eprint.iacr.org/2005/020}},
      url = {https://eprint.iacr.org/2005/020}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.