Constructing and verifying a robust Mix Net using CSP

被引:0
作者
Efstathios Stathakidis
David M. Williams
James Heather
机构
[1] University of Surrey,Department of Computing
[2] VU University Amsterdam,Theoretical Computer Science
[3] Chiastic Security Ltd,undefined
来源
Software & Systems Modeling | 2016年 / 15卷
关键词
Mix Nets; Formal methods; Model checking; CSP; FDR;
D O I
暂无
中图分类号
学科分类号
摘要
A Mix Net is a cryptographic protocol that unlinks the correspondence between its inputs and its outputs. In this paper, we formally analyse a Mix Net using the process algebra CSP and its associated model checker FDR. The protocol that we verify removes the reliance on a Web Bulletin Board: rather than communicating via a Web Bulletin Board, the protocol allows the mix servers to communicate directly, exchanging signed messages and maintaining their own records of the messages they have received. Mix Net analyses in the literature are invariably focused on safety properties; important liveness properties, such as deadlock freedom, are wholly neglected. This is an unhappy omission, however, since a Mix Net that produces no results is of little use. In contrast, we verify here that the Mix Net is guaranteed to terminate, with each honest mix server outputting the decrypted vector of plaintexts alongside a chain proving that each re-encryption/permutation and partial decryption operation was performed correctly, under the assumption that there is an honest majority of them acting according to the protocol.
引用
收藏
页码:1063 / 1089
页数:26
相关论文
共 18 条
[1]  
Chaum D(1981)Untraceable electronic mail, return addresses, and digital pseudonyms Commun. ACM 24 84-88
[2]  
Delaune S(2009)Verifying privacy-type properties of electronic voting protocols J. Comput. Secur. 17 435-487
[3]  
Kremer S(1983)On the security of public key protocols IEEE Trans. Inf. Theory 29 198-207
[4]  
Ryan M(1985)A public key cryptosystem and a signature scheme based on discrete logarithms IEEE Trans. Inf. Theory 31 469-472
[5]  
Dolev D(1995)An attack on the Needham–Schroeder public-key authentication protocol Inf. Process. Lett. 56 131-133
[6]  
Yao AC-C(1982)The Byzantine generals problem ACM Trans. Program. Lang. Syst. 4 382-401
[7]  
Gamal TE(1978)Using encryption for authentication in large networks of computers Commun. ACM 21 993-999
[8]  
Lowe G(2009)Prêt à voter: a voter-verifiable voting system IEEE Trans. Inf. Forensics Secur. 4 662-673
[9]  
Lamport L(undefined)undefined undefined undefined undefined-undefined
[10]  
Shostak RE(undefined)undefined undefined undefined undefined-undefined