Computational probabilistic non-interference

被引:0
|
作者
Backes, M [1 ]
Pfitzmann, B
机构
[1] Univ Saarland, D-6600 Saarbrucken, Germany
[2] IBM Corp, Zurich Res Lab, CH-8803 Ruschlikon, Switzerland
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In recent times information flow and non-interference have become very popular concepts for expressing both integrity and privacy properties. We present the first general definition of probabilistic non-interference in reactive systems which includes a computational case. This case is essential to cope with real cryptography since non-interference properties can usually only be guaranteed if the underlying cryptographic primitives have not been broken. This might happen, but only with negligible probability. Furthermore, our definition links noninterference with the common approach of simulatability that modern cryptography often uses. We show that our definition is maintained under simulatability, which allows secure composition of systems, and we present a general strategy how cryptographic primitives can be included in information flow proofs. As an example we present an abstract specification and a possible implementation of a cryptographic firewall guarding two honest users from their environment.
引用
收藏
页码:1 / 23
页数:23
相关论文
共 50 条
  • [1] Abstractions of non-interference security: probabilistic versus possibilistic
    Hoang, T. S.
    McIver, A. K.
    Meinicke, L.
    Morgan, C. C.
    Sloane, A.
    Susatyo, E.
    FORMAL ASPECTS OF COMPUTING, 2014, 26 (01) : 169 - 194
  • [2] Abstract non-interference - Parameterizing non-interference by abstract interpretation
    Giacobazzi, R
    Mastroeni, I
    ACM SIGPLAN NOTICES, 2004, 39 (01) : 186 - 197
  • [3] NON-INTERFERENCE
    VELASCO, LMA
    COLUMBIA JOURNALISM REVIEW, 1977, 15 (05) : 62 - 62
  • [4] On interference and non-interference in the SMEFT
    Andreas Helset
    Michael Trott
    Journal of High Energy Physics, 2018
  • [5] On interference and non-interference in the SMEFT
    Helset, Andreas
    Trott, Michael
    JOURNAL OF HIGH ENERGY PHYSICS, 2018, (04):
  • [6] Approximate non-interference
    Di Pierro, A
    Hankin, C
    Wiklicky, H
    15TH IEEE COMPUTER SECURITY FOUNDATION WORKSHOP, PROCEEDINGS, 2002, : 3 - 17
  • [7] Composability of non-interference
    Zakinthinos, A.
    Lee, E.S.
    Journal of Computer Security, 1994, 3 (04) : 269 - 281
  • [8] Non-interference and Awareness
    Pat Phelan J.
    Mindfulness, 2010, 1 (3) : 193 - 195
  • [9] NATIVE AMERICAN NON-INTERFERENCE
    GOODTRACKS, JG
    SOCIAL WORK, 1973, 18 (06) : 30 - 34
  • [10] Non-interference through determinism
    Oxford Univ Computing Lab, Oxford, United Kingdom
    J Computer Secur, 1 (27-53):