@inproceedings{baf9336571884fb7be3216f535589812,
title = "Analysis of Key-Exchange protocols and their use for building secure channels",
abstract = "We present a formalism for the analysis of key-exchange protocols that combines previous definitional approaches and results in a definition of security that enjoys some important analytical benefits: (i) any key-exchange protocol that satisfies the security definition can be composed with symmetric encryption and authentication functions to provide provably secure communication channels (as defined here); and (ii) the definition allows for simple modular proofs of security: one can design and prove security of key-exchange protocols in an idealized model where the communication links are perfectly authenticated, and then translate them using general tools to obtain security in the realistic setting of adversary-controlled links. We exemplify the usability of our results by applying them to obtain the proof of two classes of key-exchange protocols, Diffie-Hellman and key-transport, authenticated via symmetric or asymmetric techniques.",
author = "Ran Canetti and Hugo Krawczyk",
note = "Publisher Copyright: {\textcopyright} Springer-Verlag Berlin Heidelberg 2001.; International Conference on the Theory and Application of Cryptographic Techniques, EUROCRYPT 2001 ; Conference date: 06-05-2001 Through 10-05-2001",
year = "2001",
doi = "10.1007/3-540-44987-6_28",
language = "אנגלית",
isbn = "3540420703",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "453--474",
editor = "Birgit Pfitzmann",
booktitle = "Advances in Cryptology - EUROCRYPT 2001 - International Conference on the Theory and Application of Cryptographic Techniques, Proceedings",
}