A Top-Down Look at a Secure Message
نویسندگان
چکیده
In ongoing work, we are investigating the design of secure distributed implementations of high-level process calculi (in particular, of the join-calculus). We formulate implementations as translations to lower-level languages with cryptographic primitives. Cryptographic protocols are essential components of those translations. In this paper we discuss basic cryptographic protocols for transmitting a single datum from one site to another. We explain some sufficient correctness conditions for these protocols. As an example, we present a simple protocol and a proof of its correctness.
منابع مشابه
Efficient Secure Two - Party Protocols ”
This book provides a rigorous introduction to a smaller example of general secure multiparty computation (SMC), namely the case of two-party protocols. The approach is structured somewhat top-down: the authors first explain notions of security and security definitions for their chosen scenario, namely that of two-party protocols, with a static adversary, in the stand-alone model; then they look...
متن کاملPractical unconditionally secure two-channel message authentication
We investigate unconditional security for message authentication protocols that are designed using two-channel cryptography. We look at both noninteractive message authentication protocols (NIMAPs) and interactive message authentication protocols (IMAPs). We provide a new proof of nonexistence of nontrivial unconditionally secure NIMAPs. This proof consists of a combinatorial counting argument ...
متن کاملPerformance Study of Untrusted Relay Network Utilizing Cooperative Jammer
Abstract—In this paper, the problem of secure transmission in two-hop amplify-and-forward (AF) systems with an untrusted relay is investigated. To prevent the untrusted relay from intercepting the source message and to achieve positive secrecy rate, the destination-based cooperative jamming (DBCJ) technique is used. In this method the destination sends an intended jamming signal to the relay. T...
متن کاملMastoid Cavity Obliteration with Combined Palva Flap and Bone pâté
Introduction: This study was designed to evaluate the usefulness of mastoid cavity obliteration with combined bone pâté and Palva flap in the prevention of problematic mastoid cavities after canal wall down mastoidectomy. Materials and Methods: In a prospective longitudinal study with a mean follow-up of 28 months conducted between 2008–2012, a series of 56 ears in 48 patients with chronic ot...
متن کاملThe Effect of Bottom-up/Top- down Techniques on Lower vs. Upper -Intermediate EFL Learners’ Listening Comprehension
Listening is regarded as an interactive process involving decoding of information. This study was launched to find out the impact of bottom-up (BU) and top-down (TD) techniques on Iranian lower and upper intermediate learners’ listening comprehension. We selected a total of 120 participants in six intact classes, three lower intermediate and three upper intermediate. The proficiency level of th...
متن کامل