Safely composing security protocols

被引:0
|
作者
Cortier, Veronique [1 ]
Delaitre, Jeremie [1 ]
Delaune, Stephanie [1 ]
机构
[1] LORIA, CNRS, Nancy, France
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Security protocols are small programs that axe executed in hostile environments. Many results and tools have been developed to formally analyze the security of a protocol. However even when a protocol has been proved secure, there is absolutely no guarantee if the protocol is executed in an environment where other protocols, possibly sharing some common identities and keys like public keys or long-term symmetric keys, are executed. In this paper, we show that whenever a protocol is secure, it remains secure even in an environment where arbitrary protocols are executed, provided each encryption contains some tag identifying each protocol, like e.g. the name of the protocol.
引用
收藏
页码:352 / 363
页数:12
相关论文
共 50 条
  • [1] Safely composing security protocols
    Véronique Cortier
    Stéphanie Delaune
    [J]. Formal Methods in System Design, 2009, 34 : 1 - 36
  • [2] Safely composing security protocols
    Cortier, Veronique
    Delaune, Stephanie
    [J]. FORMAL METHODS IN SYSTEM DESIGN, 2009, 34 (01) : 1 - 36
  • [3] Composing security protocols: From confidentiality to privacy
    School of Informatics, University of Edinburgh, United Kingdom
    不详
    不详
    不详
    [J]. Lect. Notes Comput. Sci., (324-343):
  • [4] Composing safely -: A type system for aspects
    Kammueller, Florian
    Sudhof, Henry
    [J]. SOFTWARE COMPOSITION, 2008, 4954 : 231 - +
  • [5] Composing Protocols with Randomized Actions
    Bauer, Matthew S.
    Chadha, Rohit
    Viswanathan, Mahesh
    [J]. PRINCIPLES OF SECURITY AND TRUST (POST 2016), 2016, 9635 : 189 - 210
  • [6] Composing security properties
    Lee, S
    [J]. SECURITY PROTOCOLS, 2000, 1796 : 6 - 14
  • [7] Composing Quantum Protocols in a Classical Environment
    Fehr, Serge
    Schaffner, Christian
    [J]. THEORY OF CRYPTOGRAPHY, 6TH THEORY OF CRYPTOGRAPHY CONFERENCE, TCC 2009, 2009, 5444 : 350 - 367
  • [8] Composing security policies with polymer
    Bauer, L
    Ligatti, J
    Walker, D
    [J]. ACM SIGPLAN NOTICES, 2005, 40 (06) : 305 - 314
  • [9] A METHOD OF COMPOSING COMMUNICATION PROTOCOLS WITH PRIORITY SERVICE
    HIGUCHI, M
    SEKI, H
    KASAMI, T
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 1992, E75B (10) : 1032 - 1042
  • [10] Positron: Composing Commitment-Based Protocols
    Gerard, Scott N.
    Telang, Pankaj R.
    Kalia, Anup K.
    Singh, Munindar P.
    [J]. SERVICE-ORIENTED COMPUTING, (ICSOC 2015), 2015, 9435 : 19 - 35