A Testing Theory for a Higher-Order Cryptographic Language (Extended Abstract)

被引:0
作者
Koutavas, Vasileios [1 ]
Hennessy, Matthew [1 ]
机构
[1] Trinity Coll Dublin, Dublin, Ireland
来源
PROGRAMMING LANGUAGES AND SYSTEMS | 2011年 / 6602卷
关键词
SYMBOLIC BISIMULATION; CALCULUS;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
We study a higher-order concurrent language with cryptographic primitives, for which we develop a sound and complete, first-order testing theory for the preservation of safety properties. Our theory is based on co-inductive set simulations over transitions in a first-order Labelled Transition System. This keeps track of the knowledge of the observer, and treats transmitted higher-order values in a symbolic manner, thus obviating the quantification over functional contexts. Our characterisation provides an attractive proof technique, and we illustrate its usefulness in proofs of equivalence, including cases where bisimulation theory does not apply.
引用
收藏
页码:358 / 377
页数:20
相关论文
共 25 条
[1]   A calculus for cryptographic protocols: The spi calculus [J].
Abadi, M ;
Gordon, AD .
INFORMATION AND COMPUTATION, 1999, 148 (01) :1-70
[2]  
Abadi M., 1998, Nordic Journal of Computing, V5, P267
[3]   Mobile values, new names, and secure communication [J].
Abadi, M ;
Fournet, C .
ACM SIGPLAN NOTICES, 2001, 36 (03) :104-115
[4]  
Boreale M, 2002, SIAM J COMPUT, V31, P947
[5]   On bisimulations for the spi calculus [J].
Borgström, J ;
Nestmann, U .
MATHEMATICAL STRUCTURES IN COMPUTER SCIENCE, 2005, 15 (03) :487-552
[6]  
Borgström J, 2004, LECT NOTES COMPUT SC, V3170, P161
[7]   Symbolic bisimulation for the applied pi calculus [J].
Delaune, Stephanie ;
Kremer, Steve ;
Ryan, Mark .
JOURNAL OF COMPUTER SECURITY, 2010, 18 (02) :317-377
[8]   TESTING EQUIVALENCES FOR PROCESSES [J].
DENICOLA, R ;
HENNESSY, MCB .
THEORETICAL COMPUTER SCIENCE, 1984, 34 (1-2) :83-133
[9]   Automatic testing equivalence verification of spi calculus specifications [J].
Durante, L ;
Sisto, R ;
Valenzano, A .
ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2003, 12 (02) :222-284
[10]   A type discipline for authorization in distributed systems [J].
Fournet, Cedric ;
Gordon, Andrew D. ;
Maffeis, Sergio .
20TH IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSFS20), PROCEEDINGS, 2007, :31-45