Compositionality of game-based secure key-exchange
Seminar Room 1, Newton Institute
AbstractIn this talk I will present two approaches towards modular security proofs for the composition of key exchange protocols with arbitrary other cryptographic tasks. While the two approaches differ in their scope and applicability they both rely on game-based security security and avoids the idiosyncrasies of simulation-based definitions. As an application, I will discuss how the results can be applied to proving the security of the Transport Layer Security protocol.
If it doesn't, something may have gone wrong with our embedded player.
We'll get it fixed as soon as possible.