Composing Protocols with Randomized Actions

被引:4
|
作者
Bauer, Matthew S. [1 ]
Chadha, Rohit [2 ]
Viswanathan, Mahesh [1 ]
机构
[1] Univ Illinois, Champaign, IL 61820 USA
[2] Univ Missouri, Columbia, MO 65211 USA
关键词
SECURITY; AUTHENTICATION;
D O I
10.1007/978-3-662-49635-0_10
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Recently, several composition results have been established, showing that two cryptographic protocols proven secure against a Dolev-Yao attacker continue to afford the same security guarantees when composed together, provided the protocol messages are tagged with the information of which protocol they belong to. The key technical tool used to establish this guarantee is a separation result which shows that any attack on the composition can be mapped to an attack on one of the composed protocols running in isolation. We consider the composition of protocols which, in addition to using cryptographic primitives, also employ randomization within the protocol to achieve their goals. We show that if the protocols never reveal a secret with a probability greater than a given threshold, then neither does their composition, given that protocol messages are tagged with the information of which protocol they belong to.
引用
收藏
页码:189 / 210
页数:22
相关论文
共 50 条
  • [41] ANTON: Composing Logic and Logic Composing
    Boenn, Georg
    Brain, Martin
    De Vos, Marina
    Ffitch, John
    [J]. LOGIC PROGRAMMING AND NONMONOTONIC REASONING, PROCEEDINGS, 2009, 5753 : 542 - +
  • [42] Composing
    Stuth, Tricia
    [J]. JOURNAL OF ARCHITECTURAL EDUCATION, 2018, 72 (01) : 178 - 179
  • [43] 'COMPOSING'
    CATCHINGS, M
    [J]. DEKALB LITERARY ARTS JOURNAL, 1976, 9 (02): : 48 - 48
  • [44] COMPOSING
    POURNELLE, J
    [J]. BYTE, 1986, 11 (05): : 394 - 394
  • [45] Evaluation of the implementation cost of cache coherence protocols using omniscient actions
    de Massas, Pierre Guironnet
    Petrot, Frederic
    [J]. DESIGN AUTOMATION FOR EMBEDDED SYSTEMS, 2010, 14 (01) : 21 - 42
  • [46] Synthesis of Control Protocols for Multi-Agent Systems with Similar Actions
    Su, Rong
    Lin, Liyong
    [J]. 2013 IEEE 52ND ANNUAL CONFERENCE ON DECISION AND CONTROL (CDC), 2013, : 6986 - 6991
  • [47] Evaluation of the implementation cost of cache coherence protocols using omniscient actions
    Pierre Guironnet de Massas
    Frédéric Pétrot
    [J]. Design Automation for Embedded Systems, 2010, 14 : 21 - 42
  • [48] ULSA: unified language of synthesis actions for the representation of inorganic synthesis protocols
    Wang, Zheren
    Cruse, Kevin
    Fei, Yuxing
    Chia, Ann
    Zeng, Yan
    Huo, Haoyan
    He, Tanjin
    Deng, Bowen
    Kononova, Olga
    Ceder, Gerbrand
    [J]. DIGITAL DISCOVERY, 2022, 1 (03): : 313 - 324
  • [49] Synthesis of attack actions using model checking for the verification of security protocols
    Basagiannis, Stylianos
    Katsaros, Panagiotis
    Pombortsis, Andrew
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (02) : 147 - 161
  • [50] 'Composing'
    Fox, R
    [J]. PARNASSUS-POETRY IN REVIEW, 1997, 22 (1-2): : 247 - 247