Analyzing security protocols using time-bounded Task-PIOAs

被引:25
作者
Canetti, Ran [2 ,3 ]
Cheung, Ling [3 ]
Kaynar, Dilsun [1 ]
Liskov, Moses [4 ]
Lynch, Nancy [3 ]
Pereira, Olivier
Segala, Roberto [5 ]
机构
[1] Carnegie Mellon Univ, Pittsburgh, PA 15213 USA
[2] IBM Corp, TJ Watson Res Ctr, Hawthorne, NY USA
[3] MIT, Cambridge, MA 02139 USA
[4] Coll William & Mary, Williamsburg, VA USA
[5] Univ Verona, I-37100 Verona, Italy
来源
DISCRETE EVENT DYNAMIC SYSTEMS-THEORY AND APPLICATIONS | 2008年 / 18卷 / 01期
关键词
security protocols; time-bounded task-PIOAs; probabilistic input/output automata; oblivious transfer;
D O I
10.1007/s10626-007-0032-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents the time-bounded task-PIOA modeling framework, an extension of the probabilistic input/output automata (PIOA) framework that can be used for modeling and verifying security protocols. Time-bounded task-PIOAs can describe probabilistic and nondeterministic behavior, as well as time-bounded computation. Together, these features support modeling of important aspects of security protocols, including secrecy requirements and limitations on the computational power of adversarial parties. They also support security protocol verification using methods that are compatible with less formal approaches used in the computational cryptography research community. We illustrate the use of our framework by outlining a proof of functional correctness and security properties for a well-known oblivious transfer protocol.
引用
收藏
页码:111 / 159
页数:49
相关论文
共 39 条
[1]   Reconciling two views of cryptography (The computational soundness of formal encryption) [J].
Abadi, M ;
Rogaway, P .
JOURNAL OF CRYPTOLOGY, 2002, 15 (02) :103-127
[2]  
[Anonymous], 2001, FDN CRYPTOGRAPHY
[3]  
[Anonymous], 2003, P 10 ACM C COMP COMM
[4]  
Backes M, 2004, LECT NOTES COMPUT SC, V2951, P336
[5]  
BACKES M, 2004, SECURE ASYNCHRONOUS
[6]  
Barthe G, 2004, LECT NOTES ARTIF INT, V3097, P385
[7]  
BELLARE M, 2004, GAME PLAYING TECHNIQ
[8]  
BLANCHET B, 2005, COMPUTATIONALLY SOUN
[9]   A computationally sound mechanized prover for security protocols [J].
Blanchet, Bruno .
2006 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2006, :140-154
[10]  
Cachin C, 1997, LECT NOTES COMPUT SC, V1294, P292