## CryptoDB

### Paper: (De)Compositions of Cryptographic Schemes and their Applications to Protocols

Authors: R. Janvier Y. Lakhnech L. Mazare URL: http://eprint.iacr.org/2005/020 Search ePrint Search Google The main result of this paper is that the Dolev-Yao model is a safe abstraction of the computational model for security protocols including those that combine asymmetric and symmetric encryption, signature and hashing. Moreover, message forwarding and private key transmission are allowed. To our knowledge this is the first result that deals with hash functions and the combination of these cryptographic primitives. A key step towards this result is a general definition of correction of cryptographic primitives, that unifies well known correctness criteria such as IND-CPA, IND-CCA, unforgeability etc.... and a theorem that allows to reduce the correctness of a composition of two cryptographic schemes to the correctness of each one.
##### BibTeX
@misc{eprint-2005-12359,
title={(De)Compositions of Cryptographic Schemes and their Applications to Protocols},
booktitle={IACR Eprint archive},
keywords={cryptographic protocols / Security, Cryptographic Protocols, Formal Encryption, Probabilistic Encryption, Dolev-Yao Model, Computational Model},
url={http://eprint.iacr.org/2005/020},
note={Unpublished laurent.mazare@imag.fr 12944 received 14 Jan 2005, last revised 10 Jun 2005},
author={R. Janvier and Y. Lakhnech and L. Mazare},
year=2005
}