[Resource Topic] 2005/020: (De)Compositions of Cryptographic Schemes and their Applications to Protocols

Welcome to the resource topic for 2005/020

Title:
(De)Compositions of Cryptographic Schemes and their Applications to Protocols

Authors: R. Janvier, Y. Lakhnech, L. Mazare

Abstract:

The main result of this paper is that the Dolev-Yao model is a safe abstraction of the computational model for security protocols including those that combine asymmetric and symmetric encryption, signature and hashing. Moreover, message forwarding and private key transmission are allowed. To our knowledge this is the first result that deals with hash functions and the combination of these cryptographic primitives.

A key step towards this result is a general definition of correction of cryptographic primitives, that unifies well known correctness criteria such as IND-CPA, IND-CCA, unforgeability etc… and a theorem that allows to reduce the correctness of a composition of two cryptographic schemes to the correctness of each one.

ePrint: https://eprint.iacr.org/2005/020

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .