Universally Composable Security: A New Paradigm for Cryptographic Protocols
FOCS '01 Proceedings of the 42nd IEEE symposium on Foundations of Computer Science
Automatic verification of correspondences for security protocols
Journal of Computer Security
Universally composable symbolic analysis of mutual authentication and key-exchange protocols
TCC'06 Proceedings of the Third conference on Theory of Cryptography
Information Sciences: an International Journal
Hi-index | 0.00 |
The Trusted Computing Group has proposed Trusted Network Connection (TNC) Architecture and a series of interface specifications, such as IF-T and IF-TNCCS, to solve the interoperability of network access control. In particular, IF-T describes the mapping of IF-TNCCS messages to a standard TNC Extensible Authentication Protocol (EAP) method. It includes specification of the standard EAP method called EAP-TNC. Since EAP-TNC is important to encapsulate TNCCS messages so that they can be carried over tunneled EAP methods, this paper proposes a computationally sound symbolic analysis of EAP-TNC protocol to prove composable security property.