Universally Composable Key-Management (bibtex)
by Steve Kremer, Robert Künnemann, Graham Steel
Abstract:
We present the first universally composable key-management functionality, formalized in the GNUC framework by Hofheinz and Shoup. It allows the enforcement of a wide range of security policies and can be extended by diverse key usage operations with no need to repeat the security proof. We illustrate its use by proving an implementation of a security token secure with respect to arbitrary key-usage operations and explore a proof technique that allows the storage of cryptographic keys externally, a novel development in simulation-based security frameworks.
Reference:
Universally Composable Key-Management (Steve Kremer, Robert Künnemann, Graham Steel), In Proceedings of the 18th European Symposium on Research in Computer Security (ESORICS'13) (Jason Crampton, Sushil Jajodia, Keith Mayes, eds.), Springer, volume 8134, 2013.
Bibtex Entry:
@inproceedings{KKS-esorics13,
	Address = {Egham, U.K.},
	Author = {Kremer, Steve and K{\"u}nnemann, Robert and Steel, Graham},
	Booktitle = {{P}roceedings of the 18th {E}uropean {S}ymposium on {R}esearch in {C}omputer {S}ecurity ({ESORICS}'13)},
	Editor = {Crampton, Jason and Jajodia, Sushil and Mayes, Keith},
	Month = sep,
	Publisher = {Springer},
	Series = {Lecture Notes in Computer Science},
	Title = {Universally Composable Key-Management},
	Pages = {327-344},
	Volume = {8134},
	Year = {2013},
DOI ={10.1007/978-3-642-40203-6_19},
  x-audience = {international},
  x-language = {EN},
  x-town = {Egham},
  x-country = {GB},
  x-yearstart={2013},
  abstract = {We present the first universally composable key-management functionality, formalized in the GNUC framework by Hofheinz and Shoup. It allows the enforcement of a wide range of security policies and can be extended by diverse key usage operations with no need to repeat the security proof. We illustrate its use by proving an implementation of a security token secure with respect to arbitrary key-usage operations and explore a proof technique that allows the storage of cryptographic keys externally, a novel development in simulation-based security frameworks.}
}
Powered by bibtexbrowser