期刊文献+

Using IND-CVA for constructing secure communication

Using IND-CVA for constructing secure communication
原文传递
导出
摘要 Within the framework of UC (universally composable) security, a general method is presented to construct a secure channel protocol with using IND-CVA (indistinguishability of encryption scheme under ciphertext verification attacks). A channel protocol with using the method first invokes an ideal keyexchange protocol to get a session key, and then computes the messages with an authenticated encryption scheme. The paper shows that a channel protocol is UC secure if and only if the underlying authenticated encryption scheme is both IND-CVA secure and INT-PTXT secure. The condition about secure channel protocol in this paper is much weaker than IND-CCA secure and INT-CTXT secure. The IND-CVA can be presented for describing the privacy requirements of secure channels in detail. Moreover, the method for designing secure channel protocol in the paper reduces the UC security of secure channels, which are measured by action-simulation in the UC security framework, to the security of authenticated encryption schemes, which are measured semantically. Within the framework of UC (universally composable) security, a general method is presented to construct a secure channel protocol with using IND-CVA (indistinguishability of encryption scheme under ciphertext verification attacks). A channel protocol with using the method first invokes an ideal keyexchange protocol to get a session key, and then computes the messages with an authenticated encryption scheme. The paper shows that a channel protocol is UC secure if and only if the underlying authenticated encryption scheme is both IND-CVA secure and INT-PTXT secure. The condition about secure channel protocol in this paper is much weaker than IND-CCA secure and INT-CTXT secure. The IND-CVA can be presented for describing the privacy requirements of secure channels in detail. Moreover, the method for designing secure channel protocol in the paper reduces the UC security of secure channels, which are measured by action-simulation in the UC security framework, to the security of authenticated encryption schemes, which are measured semantically.
出处 《Science in China(Series F)》 2009年第10期1801-1811,共11页 中国科学(F辑英文版)
基金 Supported by the National Basic Research Program of China (Grant No. G2002cb312205)
关键词 universally composable security secure channel authenticated encryption semantic security INTEGRITY universally composable security, secure channel, authenticated encryption, semantic security, integrity
  • 相关文献

参考文献1

二级参考文献13

  • 1Krawczyk H. The order of encryption and authentication for protecting communications (or: How Security Is SSL?). In: Crypto'01, LNCS Vol. 2139. Berlin: Springer-Verlag, 2001. 310-331.
  • 2Hall C, Goldberg I, Schneier B. Reaction attacks against several public-key cryptosystems. In: Varadharajan V, Mu Y, eds. Proceedings of Information and Communication Security, ICICS'99, vol. 1726. Berlin: Springer-Verlag, 1999. 2-12.
  • 3An J H, Dodis T, Rabin T. On the security of joint signature and encryption. In: Knudsen L, ed. Advances in Cryptology- EUROCRYPT 2002, vol. 2332 of Lecture Notes in Computer Science. Berlin: Springer-Verlag, 2002. 85107.
  • 4Canetti R, Krawczyk H. Analysis of key-exchange protocols and their use for building secure channels. In: Pfitzmann B, ed. Advances in Cryptology-EUROCRYPT 2001, vol. 2045 of Lecture Notes in Computer Science. Berlin: Springer-Verlag, 2001. 453-474. Extended version at http://eprint.oacr.ogr/ 2001/040.
  • 5Canetti R, Krawczyk H, Universally composable notions of key exchange and secure channels. In: Eurocypt'02, LNCS Vol. 2332. 2003. 337-351. Extended version at http://eprint. oacr.ogr/2002/059,.
  • 6Canetti R. Universally composable security: a new paradigm for cryptographic protocols. In: 42nd FOCS, 2001, the latest full version available at http://eprint.iacr.org/2000/067.
  • 7Namprempre C. Secure channels based on authenticated encryption schemes: a simple characterization. In: Zheng Y, ed. Advance in Cryptology-ASIACRYPT 2002, Lecture Notes in Computer Science. Berlin: Springer-Verlag, 2002.
  • 8Goldwasser S, Bellare M. Lecture Notes on Cryptography.Summer course on cryptography, MIT, 1996-2001. Available from Http://theory.lcs.mit.edu/shafi.
  • 9Bellare M, Namprempre C. Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. In: Okamoto T, ed. Advances in Cryptology- ASIACRYPT 2000, volume 1976 of Lecture Notes in Computer Science. Berlin: Springer-Verlag, 2000. 531-545.
  • 10Bellare M, Desai A, Jokipii E, et al. A concrete security treatment of symmetric encryption: Analysis of the DES modes of operation. In: Proceedings of the 38th Symposium on Foundations of Computer Science, IEEE Computer Society Press, 1997. 394-403.

共引文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部