AbstractWe define reactive simulatability for general asynchronous systems. Roughly, simulatability means that a real system implements an ideal system (specification) in a way that preserves security in a general cryptographic sense. Reactive means that the system can interact with its users multiple times, e.g., in many concurrent protocol runs or a multi-round game. In terms of distributed systems, reactive simulatability is a type of refinement that preserves particularly strong properties, in particular confidentiality. A core feature of reactive simulatability is composability, i.e., the real system can be plugged in instead of the ideal system within arbitrary larger systems; this is shown in follow-up papers, and so is the preservat...
We present an operational model for describing random reactive systems. Some models have already bee...
The verification of safety-critical systems has become an area of increasing importance in computer...
Simulatability constitutes the cryptographic notion of a secure refinement and has asserted its posi...
AbstractWe define reactive simulatability for general asynchronous systems. Roughly, simulatability ...
Abstract. Security-critical systems are an important application area for formal methods. However, s...
We introduce a precise definition of the security of reactive systems following the simulatability a...
The cryptographic concept of simulatability has become a salient technique for faithfully analyzing ...
AbstractThe cryptographic concept of simulatability has become a salient technique for faithfully an...
Abstract. Simulatability has established itself as a salient notion for defining and proving the sec...
Modelling cryptographic protocols and analysing their security is a tricky business. On the one hand...
In this paper, we analyze the suitability of reactive frameworks for modelling and veri cation of ...
Recently, there has been much interest in extending models for simulation-based security in such a ...
The combination of two security protocols, a simple shared-key communication protocol and the Diffie...
We propose reactive Turing machines, extending classical Turing machines with a process-theoretical ...
Abstract. Simulatability has established itself as a salient notion for dening and proving the secur...
We present an operational model for describing random reactive systems. Some models have already bee...
The verification of safety-critical systems has become an area of increasing importance in computer...
Simulatability constitutes the cryptographic notion of a secure refinement and has asserted its posi...
AbstractWe define reactive simulatability for general asynchronous systems. Roughly, simulatability ...
Abstract. Security-critical systems are an important application area for formal methods. However, s...
We introduce a precise definition of the security of reactive systems following the simulatability a...
The cryptographic concept of simulatability has become a salient technique for faithfully analyzing ...
AbstractThe cryptographic concept of simulatability has become a salient technique for faithfully an...
Abstract. Simulatability has established itself as a salient notion for defining and proving the sec...
Modelling cryptographic protocols and analysing their security is a tricky business. On the one hand...
In this paper, we analyze the suitability of reactive frameworks for modelling and veri cation of ...
Recently, there has been much interest in extending models for simulation-based security in such a ...
The combination of two security protocols, a simple shared-key communication protocol and the Diffie...
We propose reactive Turing machines, extending classical Turing machines with a process-theoretical ...
Abstract. Simulatability has established itself as a salient notion for dening and proving the secur...
We present an operational model for describing random reactive systems. Some models have already bee...
The verification of safety-critical systems has become an area of increasing importance in computer...
Simulatability constitutes the cryptographic notion of a secure refinement and has asserted its posi...