Repository logo

Infoscience

  • English
  • French
Log In
Logo EPFL, École polytechnique fédérale de Lausanne

Infoscience

  • English
  • French
Log In
  1. Home
  2. Academic and Research Output
  3. Conferences, Workshops, Symposiums, and Seminars
  4. Security-Preserving Asymmetric Protocol Encapsulation
 
conference paper

Security-Preserving Asymmetric Protocol Encapsulation

Vaudenay, Serge  
•
Phan, Raphael C-W  
2007
Information Security and Cryptology - ICISC 2007
ICISC 2007

Query-response based protocols between a client and a server such as SSL, TLS, SSH are asymmetric in the sense that the querying client and the responding server play different roles, and for which there is a need for two-way linkability between queries and responses within the protocol. We are motivated by the observation that though results exist in other related contexts, no provably secure scheme has been applied to the setting of client-server protocols, which differ from conventional communications on the above points. We show how to secure the communication of queries and responses in these client-server protocols in a provably secure setting. In doing so, we propose a new primitive: a query-response encapsulation scheme; we give an instantiation, and we demonstrate how this primitive can be used for our purpose. In our proof of secure encapsulation, we show how to preserve the notion of "local-security".

  • Files
  • Details
  • Metrics
Loading...
Thumbnail Image
Name

ro-qrem-icisc07proc.pdf

Access type

openaccess

Size

248.67 KB

Format

Adobe PDF

Checksum (MD5)

ca74b9c2b6d4bb5d69556daf2f35fdb2

Logo EPFL, École polytechnique fédérale de Lausanne
  • Contact
  • infoscience@epfl.ch

  • Follow us on Facebook
  • Follow us on Instagram
  • Follow us on LinkedIn
  • Follow us on X
  • Follow us on Youtube
AccessibilityLegal noticePrivacy policyCookie settingsEnd User AgreementGet helpFeedback

Infoscience is a service managed and provided by the Library and IT Services of EPFL. © EPFL, tous droits réservés