Sciweavers

ICISC
2007

Security-Preserving Asymmetric Protocol Encapsulation

13 years 5 months ago
Security-Preserving Asymmetric Protocol Encapsulation
Query-response based protocols between a client and a server such as SSL, TLS, SSH are asymmetric in the sense that the querying client and the responding server play different roles, and for which there is a need for two-way linkability between queries and responses within the protocol. We are motivated by the observation that though results exist in other related contexts, no provably secure scheme has been applied to the setting of client-server protocols, which differ from conventional communications on the above points. We show how to secure the communication of queries and responses in these client-server protocols in a provably secure setting. In doing so, we propose a new primitive: a query-response encapsulation scheme; we give an instantiation, and we demonstrate how this primitive can be used for our purpose. In our proof of secure encapsulation, we show how to preserve the notion of “local-security”.
Raphael C.-W. Phan, Serge Vaudenay
Added 29 Oct 2010
Updated 29 Oct 2010
Type Conference
Year 2007
Where ICISC
Authors Raphael C.-W. Phan, Serge Vaudenay
Comments (0)