Sciweavers

BIRTHDAY
2010
Springer

Automated Proofs for Asymmetric Encryption

14 years 1 months ago
Automated Proofs for Asymmetric Encryption
Chosen-ciphertext security is by now a standard security property for asymmetric encryption. Many generic constructions for building secure cryptosystems from primitives with lower level of security have been proposed. Providing security proofs has also become standard practice. There is, however, a lack of automated verification procedures that analyze such cryptosystems and provide security proofs. This paper presents an automated procedure for analyzing generic asymmetric encryption schemes in the random oracle model. It has been applied to several examples of encryption schemes among which the construction of Bellare-Rogaway 1993, of Pointcheval at PKC'2000 and REACT.
Judicaël Courant, Marion Daubignard, Cristian
Added 08 Nov 2010
Updated 08 Nov 2010
Type Conference
Year 2010
Where BIRTHDAY
Authors Judicaël Courant, Marion Daubignard, Cristian Ene, Pascal Lafourcade, Yassine Lakhnech
Comments (0)