{"id":"https://openalex.org/W2080269101","doi":"https://doi.org/10.1145/2046707.2046717","title":"A composable computational soundness notion","display_name":"A composable computational soundness notion","publication_year":2011,"publication_date":"2011-10-17","ids":{"openalex":"https://openalex.org/W2080269101","doi":"https://doi.org/10.1145/2046707.2046717","mag":"2080269101"},"language":"en","primary_location":{"id":"doi:10.1145/2046707.2046717","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2046707.2046717","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 18th ACM conference on Computer and communications security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5070402905","display_name":"V\u00e9ronique Cortier","orcid":null},"institutions":[{"id":"https://openalex.org/I1326498283","display_name":"Institut national de recherche en informatique et en automatique","ror":"https://ror.org/02kvxyf05","country_code":"FR","type":"funder","lineage":["https://openalex.org/I1326498283"]},{"id":"https://openalex.org/I4210121838","display_name":"Laboratoire Lorrain de Recherche en Informatique et ses Applications","ror":"https://ror.org/02vnf0c38","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I1326498283","https://openalex.org/I277688954","https://openalex.org/I4210107720","https://openalex.org/I4210121838","https://openalex.org/I4210159245","https://openalex.org/I90183372"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"Veronique Cortier","raw_affiliation_strings":["LORIA, CRNS &amp; INRIA, Nancy, France"],"affiliations":[{"raw_affiliation_string":"LORIA, CRNS &amp; INRIA, Nancy, France","institution_ids":["https://openalex.org/I1326498283","https://openalex.org/I4210121838"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5026672767","display_name":"Bogdan Warinschi","orcid":"https://orcid.org/0000-0003-3396-8870"},"institutions":[{"id":"https://openalex.org/I36234482","display_name":"University of Bristol","ror":"https://ror.org/0524sp257","country_code":"GB","type":"education","lineage":["https://openalex.org/I36234482"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Bogdan Warinschi","raw_affiliation_strings":["University of Bristol, BRISTOL, United Kingdom","University of Bristol , Bristol , United Kingdom ,"],"affiliations":[{"raw_affiliation_string":"University of Bristol, BRISTOL, United Kingdom","institution_ids":["https://openalex.org/I36234482"]},{"raw_affiliation_string":"University of Bristol , Bristol , United Kingdom ,","institution_ids":["https://openalex.org/I36234482"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5070402905"],"corresponding_institution_ids":["https://openalex.org/I1326498283","https://openalex.org/I4210121838"],"apc_list":null,"apc_paid":null,"fwci":4.008,"has_fulltext":false,"cited_by_count":20,"citation_normalized_percentile":{"value":0.93782137,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"63","last_page":"74"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9943000078201294,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/soundness","display_name":"Soundness","score":0.9887977838516235},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7257862091064453},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.610596776008606},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.45865345001220703},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.4585994482040405},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.4455116391181946},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.43714290857315063},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.2951037287712097},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.2211461067199707},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.14589923620224}],"concepts":[{"id":"https://openalex.org/C39920170","wikidata":"https://www.wikidata.org/wiki/Q693083","display_name":"Soundness","level":2,"score":0.9887977838516235},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7257862091064453},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.610596776008606},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.45865345001220703},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.4585994482040405},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.4455116391181946},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.43714290857315063},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.2951037287712097},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2211461067199707},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.14589923620224}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1145/2046707.2046717","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2046707.2046717","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 18th ACM conference on Computer and communications security","raw_type":"proceedings-article"},{"id":"pmh:oai:HAL:inria-00638552v1","is_oa":false,"landing_page_url":"https://inria.hal.science/inria-00638552","pdf_url":null,"source":{"id":"https://openalex.org/S4406922461","display_name":"SPIRE - Sciences Po Institutional REpository","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"18th ACM Conference on Computer and Communications Security - CCS 2011, Oct 2011, Chicago, United States. pp.63-74, &#x27E8;10.1145/2046707.2046717&#x27E9;","raw_type":"Conference papers"},{"id":"pmh:oai:research-information.bris.ac.uk:openaire_cris_publications/c7744aad-e074-4224-b7f6-c8fde38ad375","is_oa":false,"landing_page_url":"https://research-information.bris.ac.uk/en/publications/c7744aad-e074-4224-b7f6-c8fde38ad375","pdf_url":null,"source":{"id":"https://openalex.org/S4306400895","display_name":"Bristol Research (University of Bristol)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I36234482","host_organization_name":"University of Bristol","host_organization_lineage":["https://openalex.org/I36234482"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cortier, V & Warinschi, B 2011, A Composable Computational Soundness Notion. in Conference on Computer and Communications Security - CCS 2011. vol. -, Association for Computing Machinery, pp. 63-74.","raw_type":"contributionToPeriodical"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W1480122568","https://openalex.org/W1505659502","https://openalex.org/W1508967933","https://openalex.org/W1526393806","https://openalex.org/W1860797715","https://openalex.org/W1913041503","https://openalex.org/W1982325601","https://openalex.org/W1995008399","https://openalex.org/W1999863358","https://openalex.org/W2055665937","https://openalex.org/W2063161063","https://openalex.org/W2091877728","https://openalex.org/W2097924903","https://openalex.org/W2101645518","https://openalex.org/W2121845793","https://openalex.org/W2127035198","https://openalex.org/W2138889053","https://openalex.org/W2168151327","https://openalex.org/W2274099342","https://openalex.org/W3013607954","https://openalex.org/W3031048092"],"related_works":["https://openalex.org/W2904818008","https://openalex.org/W2904314268","https://openalex.org/W57958781","https://openalex.org/W1554274402","https://openalex.org/W87530933","https://openalex.org/W2289378658","https://openalex.org/W1531360494","https://openalex.org/W1988007309","https://openalex.org/W154233216","https://openalex.org/W2102905434"],"abstract_inverted_index":{"Computational":[0],"soundness":[1,21,65,74,101,167,187,191],"results":[2],"show":[3,184],"that":[4,66,81,103,134,174,185,196],"under":[5],"certain":[6],"conditions":[7],"it":[8,104],"is":[9,23,102,127,175],"possible":[10],"to":[11,36,129,146,189],"conclude":[12],"computational":[13,64,83,190],"security":[14,17],"whenever":[15],"symbolic":[16,93],"holds.":[18],"Unfortunately,":[19],"each":[20],"result":[22,35],"usually":[24],"established":[25],"for":[26,72,192],"some":[27,140],"set":[28],"of":[29,44,54,63,99,109,115,139,166,177],"cryptographic":[30,169],"primitives":[31,39,111,142,170],"and":[32,150],"extending":[33],"the":[34,45,79,107,110,113,119,124,159],"encompass":[37],"new":[38],"typically":[40],"requires":[41],"redoing":[42],"most":[43],"work.":[46],"In":[47],"this":[48,57],"paper":[49],"we":[50,67,183],"suggest":[51],"a":[52,61,82,92,96,122,135,172,198],"way":[53,173],"getting":[55],"around":[56],"problem.":[58],"We":[59,132],"propose":[60],"notion":[62,126,165],"term":[68],"deduction":[69,100,136,186],"soundness.":[70],"As":[71,121],"other":[73],"notions,":[75],"our":[76,164],"definition":[77],"captures":[78],"idea":[80],"adversary":[84],"does":[85],"not":[86],"have":[87],"any":[88,178],"more":[89],"power":[90],"than":[91],"adversary.":[94,120],"However,":[95],"key":[97],"aspect":[98],"considers,":[105],"intrinsically,":[106],"use":[108],"in":[112,171],"presence":[114],"functions":[116],"specified":[117],"by":[118],"consequence,":[123],"resulting":[125],"amenable":[128],"modular":[130],"extensions.":[131],"prove":[133],"sound":[137],"implementation":[138],"arbitrary":[141],"can":[143],"be":[144],"extended":[145],"include":[147],"asymmetric":[148],"encryption":[149],"public":[151],"data-structures":[152],"(e.g.":[153],"pairings":[154],"or":[155],"list),":[156],"without":[157],"repeating":[158],"original":[160],"proof":[161],"effort.":[162],"Furthermore,":[163],"concerns":[168],"independent":[176],"protocol":[179],"specification":[180],"language.":[181],"Nonetheless,":[182],"leads":[188],"languages":[193],"(or":[194],"protocols)":[195],"satisfy":[197],"so":[199],"called":[200],"commutation":[201],"property.":[202]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":1},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":3},{"year":2013,"cited_by_count":3},{"year":2012,"cited_by_count":4}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
