Secure composition of PKIs with public key protocols

V Cheval, V Cortier, B Warinschi - 2017 IEEE 30th Computer …, 2017 - ieeexplore.ieee.org
We use symbolic formal models to study the composition of public key-based protocols with
public key infrastructures (PKIs). We put forth a minimal set of requirements which a PKI …

Protocol composition for arbitrary primitives

S Ciobâca, V Cortier - 2010 23rd IEEE Computer Security …, 2010 - ieeexplore.ieee.org
We study the composition of security protocols when protocols share secrets such as keys.
We show (in a Dolev-Yao model) that if two protocols use disjoint cryptographic primitives …

Secrecy analysis in protocol composition logic

A Roy, A Datta, A Derek, JC Mitchell… - Advances in Computer …, 2007 - Springer
Extending a compositional protocol logic with an induction rule for secrecy, we prove
soundness for a conventional symbolic protocol execution model, adapt and extend …

Less is more: Relaxed yet composable security notions for key exchange

C Brzuska, M Fischlin, NP Smart, B Warinschi… - International Journal of …, 2013 - Springer
Although they do not suffer from clear attacks, various key agreement protocols (for example
that used within the TLS protocol) are deemed as insecure by existing security models for …

Joint state theorems for public-key encryption and digital signature functionalities with local computation

R Küsters, M Tuengerthal - 2008 21st IEEE Computer Security …, 2008 - ieeexplore.ieee.org
Composition theorems in simulation-based approaches allow to build complex protocols
from sub-protocols in a modular way. However, as first pointed out and studied by Canetti …

Universally composable authentication and key-exchange with global PKI

R Canetti, D Shahaf, M Vald - Public-Key Cryptography–PKC 2016: 19th …, 2016 - Springer
Message authentication and key exchange are two of the most basic tasks of cryptography
and are often basic components in complex and security-sensitive protocols. Thus …

Computationally sound compositional logic for key exchange protocols

A Datta, A Derek, JC Mitchell… - 19th IEEE Computer …, 2006 - ieeexplore.ieee.org
We develop a compositional method for proving cryptographically sound security properties
of key exchange protocols, based on a symbolic logic that is interpreted over conventional …

An encapsulated authentication logic for reasoning about key distribution protocols

I Cervesato, C Meadows… - 18th IEEE Computer …, 2005 - ieeexplore.ieee.org
Authentication and secrecy properties are proved by very different methods: the former by
local reasoning, leading to matching knowledge of all principals about the order of their …

Universally composable signature, certification, and authentication

R Canetti - Proceedings. 17th IEEE Computer Security …, 2004 - ieeexplore.ieee.org
Recently some efforts were made towards capturing the security requirements from digital
signature schemes as an ideal functionality within a composable security framework. This …

Composition theorems for CryptoVerif and application to TLS 1.3

B Blanchet - 2018 IEEE 31st Computer Security Foundations …, 2018 - ieeexplore.ieee.org
We present composition theorems for security protocols, to compose a key exchange
protocol and a symmetric-key protocol that uses the exchanged key. Our results rely on the …