Skip to main content
Top
Published in: International Journal of Information Security 4/2016

01-08-2016 | Regular Contribution

On the analysis of time-aware protocols in universal composability framework

Author: István Vajda

Published in: International Journal of Information Security | Issue 4/2016

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

We consider the analysis of time-aware cryptographic protocols in the universal composability (UC) framework (Canetti in 2000). The tasks we consider are the timeliness of messages within an instance as well as the time of validity of cryptographic credentials where the lifetime of time stamps overlaps lots of instances. We point out that the UC analysis of time-aware protocols with global access to real time clock cannot be carried out directly within the standard model. For the resolution of the corresponding problem, we considered two ways: one is the introduction of an auxiliary timing oracle into the ideal system, while the other consists of two time models: a quantized real time source and an abstract “random-time” source, and we show an essential equivalence between them. The time models provide not only theoretical but also practical benefits.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Backes, M., Pfitzmann, B.: A general composition theorem for secure reactive systems. In: Theory of Cryptograpy Conference (TCC 2004), LNCS 2951, pp. 336–354 (2004) Backes, M., Pfitzmann, B.: A general composition theorem for secure reactive systems. In: Theory of Cryptograpy Conference (TCC 2004), LNCS 2951, pp. 336–354 (2004)
3.
go back to reference Backes, M., Cervesato, I., Jaggard, A.D., Scedrov, A., Tsay, J.K.: Cryptographically sound security proofs for basic and public-key kerberos. In: Proceedings 11th European Symposium on Research in Computer Security (2006) Backes, M., Cervesato, I., Jaggard, A.D., Scedrov, A., Tsay, J.K.: Cryptographically sound security proofs for basic and public-key kerberos. In: Proceedings 11th European Symposium on Research in Computer Security (2006)
4.
go back to reference Bozga, L., Ene, C., Lacknech, Y.: A symbolic decision procedure for cryptographic protocols with time stamps. J. Log. Algebr. Program. 65, 1–35 (2005)MathSciNetCrossRefMATH Bozga, L., Ene, C., Lacknech, Y.: A symbolic decision procedure for cryptographic protocols with time stamps. J. Log. Algebr. Program. 65, 1–35 (2005)MathSciNetCrossRefMATH
5.
go back to reference Buldas, A., Laud, P., Saarepera, M., Willemson, J.: Universally composable time-stamping schemes with audit. In: ISC05, LNCS 3650. Cryptology ePrint Archive: Report (2005/198) Buldas, A., Laud, P., Saarepera, M., Willemson, J.: Universally composable time-stamping schemes with audit. In: ISC05, LNCS 3650. Cryptology ePrint Archive: Report (2005/198)
6.
go back to reference Canetti, R., Dodis, Y., Pass, R., Walfish, S.: Universally composable security with global setup. In: Cryptology ePrint Archive: Report 2006/432. 20 (2006) Canetti, R., Dodis, Y., Pass, R., Walfish, S.: Universally composable security with global setup. In: Cryptology ePrint Archive: Report 2006/432. 20 (2006)
7.
go back to reference Canetti, R.: Universally composable security:“a new paradigm for cryptographic protocols”. In: Cryptology ePrint Archive: Report 2000/067 (2000) Canetti, R.: Universally composable security:“a new paradigm for cryptographic protocols”. In: Cryptology ePrint Archive: Report 2000/067 (2000)
8.
go back to reference Canetti, R., Rabin, T.: Universal composition with joint state. In: Crypto’03 (2003) Canetti, R., Rabin, T.: Universal composition with joint state. In: Crypto’03 (2003)
9.
go back to reference Canetti, R., Krawczyk, H.: Universally composable notions of key exchange and secure channels. In: Knudsen, L.R. (ed.) EUROCRYPT 2002, LNCS 2332, pp.337–351 (2002) Canetti, R., Krawczyk, H.: Universally composable notions of key exchange and secure channels. In: Knudsen, L.R. (ed.) EUROCRYPT 2002, LNCS 2332, pp.337–351 (2002)
10.
go back to reference Matsuo, T., Matsuo, S.: On universal composable security of time-stamping protocols. In: Cryptology ePrint Archive: Report 2005/148 Matsuo, T., Matsuo, S.: On universal composable security of time-stamping protocols. In: Cryptology ePrint Archive: Report 2005/148
11.
go back to reference Pfitzmann, B., Waidner, M.: Composition and integrity preservation of secure reactive systems. In: Proceedings 7th ACM CCS, pp. 245–254 (2000) Pfitzmann, B., Waidner, M.: Composition and integrity preservation of secure reactive systems. In: Proceedings 7th ACM CCS, pp. 245–254 (2000)
Metadata
Title
On the analysis of time-aware protocols in universal composability framework
Author
István Vajda
Publication date
01-08-2016
Publisher
Springer Berlin Heidelberg
Published in
International Journal of Information Security / Issue 4/2016
Print ISSN: 1615-5262
Electronic ISSN: 1615-5270
DOI
https://doi.org/10.1007/s10207-015-0300-2

Other articles of this Issue 4/2016

International Journal of Information Security 4/2016 Go to the issue

Premium Partner