Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
10334342 | Theoretical Computer Science | 2005 | 25 Pages |
Abstract
We consider secrecy and authentication in a simple process calculus with cryptographic primitives. The standard Dolev-Yao adversary is enhanced so that it can guess the key required to decrypt an intercepted message. We borrow from the computational complexity approach the assumptions that guessing succeeds with a given negligible probability and that the resources available to adversaries are polynomially bounded. Under these hypotheses we prove that the standard Dolev-Yao adversary is as powerful as the enhanced one.
Related Topics
Physical Sciences and Engineering
Computer Science
Computational Theory and Mathematics
Authors
Roberto Zunino, Pierpaolo Degano,