Analyzing security protocols using time-bounded Task-PIOAs

被引:25
作者
Canetti, Ran [2 ,3 ]
Cheung, Ling [3 ]
Kaynar, Dilsun [1 ]
Liskov, Moses [4 ]
Lynch, Nancy [3 ]
Pereira, Olivier
Segala, Roberto [5 ]
机构
[1] Carnegie Mellon Univ, Pittsburgh, PA 15213 USA
[2] IBM Corp, TJ Watson Res Ctr, Hawthorne, NY USA
[3] MIT, Cambridge, MA 02139 USA
[4] Coll William & Mary, Williamsburg, VA USA
[5] Univ Verona, I-37100 Verona, Italy
来源
DISCRETE EVENT DYNAMIC SYSTEMS-THEORY AND APPLICATIONS | 2008年 / 18卷 / 01期
关键词
security protocols; time-bounded task-PIOAs; probabilistic input/output automata; oblivious transfer;
D O I
10.1007/s10626-007-0032-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents the time-bounded task-PIOA modeling framework, an extension of the probabilistic input/output automata (PIOA) framework that can be used for modeling and verifying security protocols. Time-bounded task-PIOAs can describe probabilistic and nondeterministic behavior, as well as time-bounded computation. Together, these features support modeling of important aspects of security protocols, including secrecy requirements and limitations on the computational power of adversarial parties. They also support security protocol verification using methods that are compatible with less formal approaches used in the computational cryptography research community. We illustrate the use of our framework by outlining a proof of functional correctness and security properties for a well-known oblivious transfer protocol.
引用
收藏
页码:111 / 159
页数:49
相关论文
共 39 条
[31]  
MULLERQUADE J, 2007, LECT NOTES COMPUTER
[32]   A model for asynchronous reactive systems and its application to Secure Message Transmission [J].
Pfitzmann, B ;
Waidner, M .
2001 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2001, :184-200
[33]  
PFITZMANN B, 2000, 7 ACM C COMP COMM SE, P245
[34]   Verification of the randomized consensus algorithm of Aspnes and Herlihy: a case study [J].
Pogosyants, A ;
Segala, R ;
Lynch, N .
DISTRIBUTED COMPUTING, 2000, 13 (03) :155-186
[35]  
Ramanathan A, 2004, LECT NOTES COMPUT SC, V2987, P468
[36]  
Segala R., 1995, Nordic Journal of Computing, V2, P250
[37]  
Segala R., 1995, Modeling and verification of randomized distributed real-time systems
[38]  
SHOUP V, 2004, SEQUENCES GAMES TOOL
[39]  
STOELINGA M, 1999, LECT NOTES COMPUTER, V1601, P53