A composable cryptographic library with nested operations

  • Authors:
  • Michael Backes;Birgit Pfitzmann;Michael Waidner

  • Affiliations:
  • IBM Research Division, Ruschlikon, Switzerland;IBM Research Division, Ruschlikon, Switzerland;IBM Research Division, Ruschlikon, Switzerland

  • Venue:
  • Proceedings of the 10th ACM conference on Computer and communications security
  • Year:
  • 2003

Quantified Score

Hi-index 0.00

Visualization

Abstract

We present the first idealized cryptographic library that can be used like the Dolev-Yao model for automated proofs of cryptographic protocols that use nested cryptographic operations, while coming with a cryptographic implementation that is provably secure under active attacks.