DocumentCode
2409565
Title
Converters for Designing Applied Cryptographic Protocols
Author
Huawei, Zhao ; Jing, Qin ; Zhifeng, Fang
Author_Institution
Sch. of Comput. & Inf. Eng., Shandong Univ. of Finance, Jinan
Volume
2
fYear
2008
fDate
17-20 Dec. 2008
Firstpage
139
Lastpage
143
Abstract
Two modularized, non-interactive converters are proposed to design applied cryptographic protocols. The converters are based on the refined scheme given by Wenbo Mao, and can transform protocols secure in the ideal model into those secure in the real model. Because the converters are modularized, once proved secure, they can be widely reused in many protocols. And in contrast to BCK-authenticator, the converters have the following advantages: 1, Because of the character of non-interactivity, the transformed protocols outputted by the converters have higher performance than those protocols outputted by BCK-authenticator. 2, The converters can transform some symmetric-key protocols that can not be transformed by BCK-authenticator. 3, The converters have algorithms, which can help to realize automatic transformation.
Keywords
convertors; cryptographic protocols; BCK-authenticator; converters; cryptographic protocols; symmetric-key protocols; Algorithm design and analysis; Cryptographic protocols; Cryptography; Design engineering; Embedded computing; Finance; Mathematics; Pervasive computing; Security; Ubiquitous computing; BCK-authenticator; converter; cryptographic protocols; refined scheme;
fLanguage
English
Publisher
ieee
Conference_Titel
Embedded and Ubiquitous Computing, 2008. EUC '08. IEEE/IFIP International Conference on
Conference_Location
Shanghai
Print_ISBN
978-0-7695-3492-3
Type
conf
DOI
10.1109/EUC.2008.18
Filename
4755220
Link To Document