Several compositional forms of simulation-based security have been proposed in the literature, including universal composability, black-box simulatability, and variants thereof. These relations between a protocol and an ideal functionality are similar enough that they can be ordered from strongest to weakest according to the logical form of their definitions. However, determining whether two relations are in fact identical depends on some subtle features that have not been brought out in previous studies. We identify the position of a ``master process in the distributed system, and some limitations on transparent message forwarding within computational complexity bounds, as two main factors. Using a general computational framework, called...
Recently, there has been much interest in extending models for simulation-based security in such a ...
Abstract. In a series of papers, Küsters et al. investigated the relationships between various notio...
AbstractWe prove properties of a process calculus that is designed for analysing security protocols....
Abstract. Several compositional forms of simulation-based security have been proposed in the literat...
Abstract. Several compositional forms of simulation-based security have been proposed in the literat...
Several related research eorts have led to three dierent ways of specifying protocol security prope...
In the context of Universal Composability, we introduce the concept of universal environments and si...
Abstract. In the context of Universal Composability, we introduce the concept of universal environme...
Concurrent general composition relates to a setting where a secure protocol is run in a network conc...
Abstract Concurrent general composition relates to a setting where a secure protocol is run in anetw...
In this paper, mostly consisting of definitions, we revisit the models of security protocols: we sho...
Formal analysis of security protocols has been researched the last decades, recent de-velopments int...
We present a symbolic framework for refinement and composition of security protocols. The framewor...
Cryptography is a cornerstone for the protection of the digital society, and security definitions li...
Two different approaches for general protocol security are proved equivalent. Concretely, we prove t...
Recently, there has been much interest in extending models for simulation-based security in such a ...
Abstract. In a series of papers, Küsters et al. investigated the relationships between various notio...
AbstractWe prove properties of a process calculus that is designed for analysing security protocols....
Abstract. Several compositional forms of simulation-based security have been proposed in the literat...
Abstract. Several compositional forms of simulation-based security have been proposed in the literat...
Several related research eorts have led to three dierent ways of specifying protocol security prope...
In the context of Universal Composability, we introduce the concept of universal environments and si...
Abstract. In the context of Universal Composability, we introduce the concept of universal environme...
Concurrent general composition relates to a setting where a secure protocol is run in a network conc...
Abstract Concurrent general composition relates to a setting where a secure protocol is run in anetw...
In this paper, mostly consisting of definitions, we revisit the models of security protocols: we sho...
Formal analysis of security protocols has been researched the last decades, recent de-velopments int...
We present a symbolic framework for refinement and composition of security protocols. The framewor...
Cryptography is a cornerstone for the protection of the digital society, and security definitions li...
Two different approaches for general protocol security are proved equivalent. Concretely, we prove t...
Recently, there has been much interest in extending models for simulation-based security in such a ...
Abstract. In a series of papers, Küsters et al. investigated the relationships between various notio...
AbstractWe prove properties of a process calculus that is designed for analysing security protocols....