We introduce and study a general transformation that maps a protocol secure in an extremely weak sense (essentially in a model where no adversary is present) into a protocol that is secure against a fully active adversary which interacts with an unbounded number of protocol sessions, and has absolute control over the network. The transformation works for arbitrary protocols with any number of participants, written with usual cryptographic primitives. Our transformation provably preserves a large class of security properties that contains secrecy and authenticity. An important byproduct contribution of this paper is a modular protocol development paradigm where designers focus their effort on an extremely simple execution setting -- security...
We propose a development method for security protocols based on stepwise re-finement. Our refinement...
Formal, symbolic techniques are extremely useful for modelling and analysing security protocols. Th...
Authenticated key exchange protocols are ubiquitous in modern-day life. They are used to secure nume...
International audienceWe propose a general transformation that maps a cryptographic protocol that is...
We propose a general transformation that maps a protocol secure in an extremely weak sense (essentia...
International audienceThe design and verification of cryptographic protocols is a notoriously diffic...
Abstract. Security protocols are small programs that are executed in hostile environments. Many resu...
International audienceSecurity protocols are small programs that are executed in hostile environment...
We propose a class of protocol transformations, which can be used to (1) develop (families of) secur...
International audienceSecurity protocols are small programs that are executed in hostile environment...
AbstractThis paper continues the program initiated in [5], towards a derivation system for security ...
Abstract Formal and symbolic techniques are extremely useful for modelling and analysing security pr...
We propose a development method for security protocols based on stepwise refinement. Our refinement ...
As distributed computing becomes increasingly prevalent, driving a demand for security and privacy i...
One of the important challenges when designing and analyzing cryptographic protocols is the enforcem...
We propose a development method for security protocols based on stepwise re-finement. Our refinement...
Formal, symbolic techniques are extremely useful for modelling and analysing security protocols. Th...
Authenticated key exchange protocols are ubiquitous in modern-day life. They are used to secure nume...
International audienceWe propose a general transformation that maps a cryptographic protocol that is...
We propose a general transformation that maps a protocol secure in an extremely weak sense (essentia...
International audienceThe design and verification of cryptographic protocols is a notoriously diffic...
Abstract. Security protocols are small programs that are executed in hostile environments. Many resu...
International audienceSecurity protocols are small programs that are executed in hostile environment...
We propose a class of protocol transformations, which can be used to (1) develop (families of) secur...
International audienceSecurity protocols are small programs that are executed in hostile environment...
AbstractThis paper continues the program initiated in [5], towards a derivation system for security ...
Abstract Formal and symbolic techniques are extremely useful for modelling and analysing security pr...
We propose a development method for security protocols based on stepwise refinement. Our refinement ...
As distributed computing becomes increasingly prevalent, driving a demand for security and privacy i...
One of the important challenges when designing and analyzing cryptographic protocols is the enforcem...
We propose a development method for security protocols based on stepwise re-finement. Our refinement...
Formal, symbolic techniques are extremely useful for modelling and analysing security protocols. Th...
Authenticated key exchange protocols are ubiquitous in modern-day life. They are used to secure nume...