Specifying privacy-preserving protocols in typed MSR

被引:6
|
作者
Balopoulos, T [1 ]
Gritzalis, S [1 ]
Katsikas, SK [1 ]
机构
[1] Univ Aegean, Lab Informat & Commun Syst Secur, Dept Informat & Commun Syst Engn, GR-83200 Karlovassi, Samos, Greece
关键词
specification of security protocols; privacy; Dolev-Yao intruder; typed MSR;
D O I
10.1016/j.csi.2005.01.008
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Privacy-preserving protocols, such as electronic cash, electronic voting and selective disclosure protocols, use special message constructors that are not widely used in other types of protocols (for example, in authentication protocols). These message constructors include blind signatures, commitments and zero-knowledge proofs. Furthermore, a standard formalization of the Dolev-Yao intruder does not take into account these message constructors, nor does it consider some types of attacks (such as privacy attacks, brute-force dictionary attacks and known-plaintext attacks) that privacy-preserving as well as other types of protocols are designed to protect against. This paper aims to present an extension of Typed MSR in order to formally specify the needed message constructors, as well as the capabilities of a Dolev-Yao intruder designed to attack such protocols. (c) 2005 Elsevier B.V All rights reserved.
引用
收藏
页码:501 / 512
页数:12
相关论文
共 50 条
  • [1] Specifying and implementing privacy-preserving cryptographic protocols
    Theodoros Balopoulos
    Stefanos Gritzalis
    Sokratis K. Katsikas
    [J]. International Journal of Information Security, 2008, 7 : 395 - 420
  • [2] Specifying and implementing privacy-preserving cryptographic protocols
    Balopoulos, Theodoros
    Gritzalis, Stefanos
    Katsikas, Sokratis K.
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2008, 7 (06) : 395 - 420
  • [3] An extension of typed MSR for specifying esoteric protocols and their Dolev-Yao intruder
    Balopoulos, T
    Gritzalis, S
    Katsikas, SK
    [J]. COMMUNICATIONS AND MULTIMEDIA SECURITY, 2005, 175 : 209 - 221
  • [4] Verifying Indistinguishability of Privacy-Preserving Protocols
    Linvill, Kirby
    Kaki, Gowtham
    Wustrow, Eric
    [J]. PROCEEDINGS OF THE ACM ON PROGRAMMING LANGUAGES-PACMPL, 2023, 7 (OOPSLA):
  • [5] Towards practical privacy-preserving protocols
    Demmler, Daniel
    [J]. IT-INFORMATION TECHNOLOGY, 2022, 64 (1-2): : 49 - 53
  • [6] Protocols for Privacy-Preserving DBSCAN Clustering
    Xu Wei-jiang
    Huang Liu-sheng
    Luo Yong-long
    Yao Yi-fei
    Jing Wei-wei
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2007, 1 (01): : 45 - 56
  • [7] Privacy-Preserving Authentication Protocols in Vanet
    Nath H.J.
    Choudhury H.
    [J]. SN Computer Science, 4 (5)
  • [8] Privacy-Preserving Authorized RFID Authentication Protocols
    Li, Nan
    Mu, Yi
    Susilo, Willy
    Guo, Fuchun
    Varadharajan, Vijay
    [J]. RADIO FREQUENCY IDENTIFICATION: SECURITY AND PRIVACY ISSUES, RFIDSEC 2014, 2014, 8651 : 108 - 122
  • [9] Verifiable Privacy-Preserving Data Aggregation Protocols
    Yasuda, Satoshi
    Koseki, Yoshihiro
    Sakai, Yusuke
    Kitagawa, Fuyuki
    Kawai, Yutaka
    Hanaoka, Goichiro
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2020, E103A (01) : 183 - 194
  • [10] Privacy-Preserving Communication Algorithms and Network Protocols
    Ren, Jian
    [J]. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, PROCEEDINGS, 2008, 5258 : 515 - 525