• DocumentCode
    2409565
  • Title

    Converters for Designing Applied Cryptographic Protocols

  • Author

    Huawei, Zhao ; Jing, Qin ; Zhifeng, Fang

  • Author_Institution
    Sch. of Comput. & Inf. Eng., Shandong Univ. of Finance, Jinan
  • Volume
    2
  • fYear
    2008
  • fDate
    17-20 Dec. 2008
  • Firstpage
    139
  • Lastpage
    143
  • Abstract
    Two modularized, non-interactive converters are proposed to design applied cryptographic protocols. The converters are based on the refined scheme given by Wenbo Mao, and can transform protocols secure in the ideal model into those secure in the real model. Because the converters are modularized, once proved secure, they can be widely reused in many protocols. And in contrast to BCK-authenticator, the converters have the following advantages: 1, Because of the character of non-interactivity, the transformed protocols outputted by the converters have higher performance than those protocols outputted by BCK-authenticator. 2, The converters can transform some symmetric-key protocols that can not be transformed by BCK-authenticator. 3, The converters have algorithms, which can help to realize automatic transformation.
  • Keywords
    convertors; cryptographic protocols; BCK-authenticator; converters; cryptographic protocols; symmetric-key protocols; Algorithm design and analysis; Cryptographic protocols; Cryptography; Design engineering; Embedded computing; Finance; Mathematics; Pervasive computing; Security; Ubiquitous computing; BCK-authenticator; converter; cryptographic protocols; refined scheme;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Embedded and Ubiquitous Computing, 2008. EUC '08. IEEE/IFIP International Conference on
  • Conference_Location
    Shanghai
  • Print_ISBN
    978-0-7695-3492-3
  • Type

    conf

  • DOI
    10.1109/EUC.2008.18
  • Filename
    4755220