Non-interference proof techniques for the analysis of cryptographic protocols

被引:2
|
作者
Bugliesi, Michele [1 ]
Rossi, Sabina [1 ]
机构
[1] Univ Ca Foscari Venezia, Dipartimento Informat, Via Torino 155, I-30172 Venice, Italy
关键词
Process calculi; concurrency; behavioral equivalences; security;
D O I
10.3233/JCS-2005-13104
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Non-interference has been advocated by various authors as a uniform framework for the formal specification of security properties in cryptographic protocols. Unfortunately, specifications based on noninterference are often non-effective, as they require protocol analyses in the presence of all possible intruders. This paper develops new characterizations of non-interference that rely on a finitary representation of intruders. These characterizations draw on equivalence relations built on top of labelled transition systems in which the presence of intruders is accounted for, indirectly, in terms of their (the intruders') knowledge of the protocols' initial data. The new characterizations apply uniformly to trace and bisimulation noninterference, yielding proof techniques for the analysis of various security properties. We demonstrate the effectiveness of such techniques in the analysis of different properties of a fair exchange protocol.
引用
收藏
页码:87 / 113
页数:27
相关论文
共 50 条
  • [1] Non interference for the analysis of cryptographic protocols
    Focardi, R
    Gorrieri, R
    Martinelli, F
    AUTOMATA LANGUAGES AND PROGRAMMING, 2000, 1853 : 354 - 372
  • [2] Intransitive non-interference for cryptographic purposes
    Backes, M
    Pfitzmann, B
    2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2003, : 140 - 152
  • [3] A Proof System for Abstract Non-interference
    Giacobazzi, Roberto
    Mastroeni, Isabella
    JOURNAL OF LOGIC AND COMPUTATION, 2010, 20 (02) : 449 - 479
  • [4] Abstract non-interference - Parameterizing non-interference by abstract interpretation
    Giacobazzi, R
    Mastroeni, I
    ACM SIGPLAN NOTICES, 2004, 39 (01) : 186 - 197
  • [5] NON-INTERFERENCE
    VELASCO, LMA
    COLUMBIA JOURNALISM REVIEW, 1977, 15 (05) : 62 - 62
  • [6] On interference and non-interference in the SMEFT
    Andreas Helset
    Michael Trott
    Journal of High Energy Physics, 2018
  • [7] On interference and non-interference in the SMEFT
    Helset, Andreas
    Trott, Michael
    JOURNAL OF HIGH ENERGY PHYSICS, 2018, (04):
  • [8] Approximate non-interference
    Di Pierro, A
    Hankin, C
    Wiklicky, H
    15TH IEEE COMPUTER SECURITY FOUNDATION WORKSHOP, PROCEEDINGS, 2002, : 3 - 17
  • [9] Composability of non-interference
    Zakinthinos, A.
    Lee, E.S.
    Journal of Computer Security, 1994, 3 (04) : 269 - 281
  • [10] PROOF OF SOUNDNESS (INTEGRITY) OF CRYPTOGRAPHIC PROTOCOLS
    SIMMONS, GJ
    JOURNAL OF CRYPTOLOGY, 1994, 7 (02) : 69 - 77