User Tools

Site Tools


A Simulation-Based Treatment of Authenticated Message Exchange (BibTeX)

@INPROCEEDINGS{KuertzSchnoorWilke-ASIAN-2009,
  author = {Klaas Ole K{\"u}rtz and Henning Schnoor and Thomas Wilke},
  title = {{A Simulation-Based Treatment of Authenticated Message Exchange}},
  year = {2009},
  editor = {Anupam Datta},
  booktitle = {Proceedings of the 14th Asian Computing Science Conference (ASIAN 2009)},
  number = {5913},
  series = {Lecture Notes in Computer Science},
  pages = {109--123},
  publisher = {Springer},
  note = {The original publication is available at \url{http://www.springerlink.com/}},
  abstract = {Simulation-based security notions for cryptographic protocols are regarded as highly desirable, primarily because they admit strong composability and, consequently, a modular design. In this paper, we give a simulation-based security definition for two-round authenticated message exchange and show that a concrete protocol, 2AMEX-1, satisfies our security property, that is, we provide an ideal functionality for two-round authenticated message exchange and show that 2AMEX-1 realizes it securely. To model the involved public-key infrastructure adequately, we use a joint-state approach.}
}