User Tools

Site Tools


A Simulation-Based Treatment of Authenticated Message Exchange (BibTeX)

@INPROCEEDINGS{KuertzSchnoorWilke-ASIAN-2009,
  author      = {Klaas Ole K{\"u}rtz and Henning Schnoor and Thomas Wilke},
  title       = {{A Simulation-Based Treatment of Authenticated Message Exchange}},
  year        = 2009,
  editor      = {Anupam Datta},
  booktitle   = {Proceedings of the 14th Asian Computing Science Conference (ASIAN 2009)},
  number      = 5913,
  series      = {Lecture Notes in Computer Science},
  pages       = {109--123},
  publisher   = {Springer},
  note        = {The original publication is available at \url{http://www.springerlink.com/}},
  abstract    = {Simulation-based security notions for cryptographic protocols are regarded as highly desirable, primarily because they admit strong composability and, consequently, a modular design. In this paper, we give a simulation-based security definition for two-round authenticated message exchange and show that a concrete protocol, 2AMEX-1, satisfies our security property, that is, we provide an ideal functionality for two-round authenticated message exchange and show that 2AMEX-1 realizes it securely. To model the involved public-key infrastructure adequately, we use a joint-state approach.}
}