Zero-knowledge in the applied pi-calculus and automated verification of the direct anonymous attestation protocol

被引:65
作者
Backes, Michael [1 ]
Maffei, Matteo [2 ]
Unruh, Dominique [2 ]
机构
[1] Max Planck Inst Software Syst, Rostock, Germany
[2] Univ Saarland, D-66123 Saarbrucken, Germany
来源
PROCEEDINGS OF THE 2008 IEEE SYMPOSIUM ON SECURITY AND PRIVACY | 2008年
关键词
D O I
10.1109/SP.2008.23
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We devise an abstraction of zero-knowledge protocols that is accessible to a fully mechanized analysis. The abstraction is formalized within the applied pi-calculus using a novel equational theory that abstractly characterizes the cryptographic semantics of zero-knowledge proofs. We present an encoding from the equational theory into a convergent rewriting system that is suitable for the automated protocol verifier ProVerif. The encoding is sound and fully automated. We successfully used ProVerif to obtain the first mechanized analysis of (a simplified variant of) the Direct Anonymous Attestation (DAA) protocol. This required us to devise novel abstractions of sophisticated cryptographic security definitions based on interactive games. The analysis reported a novel attack on DAA that was overlooked in its existing cryptographic security proof. We propose a revised variant of DAA that we successfully prove secure using ProVerif.
引用
收藏
页码:202 / +
页数:4
相关论文
共 31 条
[1]   A calculus for cryptographic protocols: The spi calculus [J].
Abadi, M ;
Gordon, AD .
INFORMATION AND COMPUTATION, 1999, 148 (01) :1-70
[2]   Secrecy by typing in security protocols [J].
Abadi, M .
JOURNAL OF THE ACM, 1999, 46 (05) :749-786
[3]  
ABADI M, 2001, P 28 ACM S PRINC PRO, P104, DOI DOI 10.1145/373243.360213
[4]   Just fast keying in the Pi calculus [J].
Abadi, Martin ;
Blanchet, Bruno ;
Fournet, Cedric .
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2007, 10 (03)
[5]  
[Anonymous], 1996, LNCS
[6]  
BACKES M, 2007, ZERO KNOWLEDGE APPL
[7]  
BACKES M, 2008, COMPUTATIONAL SOUNDN
[8]  
BACKES M, 2007, IMPLEMENTATION COMPI
[9]  
Basin D., 2004, INT J INFORM SECURIT
[10]  
Blanchet B, 2005, IEEE S LOG, P331