Verifying Accountability for Unbounded Sets of Participants

被引:1
|
作者
Morio, Kevin [1 ]
Kuennemann, Robert [1 ]
机构
[1] CISPA Helmholtz Ctr Informat Secur, Saarland Informat Campus, Saarbrucken, Germany
关键词
D O I
10.1109/CSF51468.2021.00032
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Little can be achieved in the design of security protocols without trusting at least some participants. This trust should be justified or, at the very least, subject to examination. One way to strengthen trustworthiness is to hold parties accountable for their actions, as this provides a strong incentive to refrain from malicious behavior. This has led to an increased interest in accountability in the design of security protocols. In this work, we combine the accountability definition of Kunnemann, Esiyok, and Backes [21] with the notion of case tests to extend its applicability to protocols with unbounded sets of participants. We propose a general construction of verdict functions and a set of verification conditions that achieve soundness and completeness. Expressing the verification conditions in terms of trace properties allows us to extend TAMARIN-a protocol verification tool-with the ability to analyze and verify accountability properties in a highly automated way. In contrast to prior work, our approach is significantly more flexible and applicable to a wider range of protocols.
引用
收藏
页码:173 / 188
页数:16
相关论文
共 50 条
  • [1] Verifying Security Properties in Unbounded Multiagent Systems
    Boureanu, Ioana
    Kouvaros, Panagiotis
    Lomuscio, Alessio
    AAMAS'16: PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON AUTONOMOUS AGENTS & MULTIAGENT SYSTEMS, 2016, : 1209 - 1217
  • [2] Unbounded sets of attraction
    Bischi, GI
    Mira, C
    Gardini, L
    INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2000, 10 (06): : 1437 - 1469
  • [3] UNBOUNDED SYMMETRY SETS
    HAILAT, MQ
    JOURNAL OF COMBINATORIAL THEORY SERIES A, 1985, 40 (02) : 342 - 348
  • [4] AccountVerif: A General Framework of Verifying Accountability Protocols
    Su, Cheng
    Huang, Wenchao
    Miao, Fuyou
    Xiong, Yan
    Huang, Wenchao (huangwc@ustc.edu.cn), 1600, Femto Technique Co., Ltd. (23): : 650 - 662
  • [5] Approximations of unbounded convex projections and unbounded convex sets
    Kovacova, Gabriela
    Rudloff, Birgit
    JOURNAL OF GLOBAL OPTIMIZATION, 2025, : 787 - 805
  • [6] Verifying Information Flow Control over Unbounded Processes
    Harris, William R.
    Kidd, Nicholas A.
    Chaki, Sagar
    Jha, Somesh
    Reps, Thomas
    FM 2009: FORMAL METHODS, PROCEEDINGS, 2009, 5850 : 773 - +
  • [7] Strategy for verifying security protocols with unbounded message size
    Chevalier Y.
    Vigneron L.
    Automated Software Engineering, 2004, 11 (2) : 141 - 166
  • [8] Uniqueness sets for unbounded spectra
    Olevskii, Alexander
    Ulanovskii, Alexander
    COMPTES RENDUS MATHEMATIQUE, 2011, 349 (11-12) : 679 - 681
  • [9] Unbounded convex point sets
    Stoker, JJ
    AMERICAN JOURNAL OF MATHEMATICS, 1940, 62 : 165 - 179
  • [10] FORCING CLOSED UNBOUNDED SETS
    ABRAHAM, U
    SHELAH, S
    JOURNAL OF SYMBOLIC LOGIC, 1983, 48 (03) : 643 - 657