Secure Implementations of Typed Channel Abstractions (Extended Abstract)

被引:0
|
作者
Bugliesi, Michele [1 ]
Giunti, Marco [1 ]
机构
[1] Univ Ca Foscari, Dipartimento Informat, Venice, Italy
关键词
Typed Behavioral Theories; Language Encodings; Full Abstraction;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The challenges hidden in the implementation of high-level process calculi into low-level environments are well understood [3]. This paper develops a secure implementation of a typed pi calculus, in which capability types are employed to realize the policies for the access to communication channels. Our implementation compiles high-level processes of the pi-calculus into low-level principals of a cryptographic process calculus based on the applied-pi calculus [1]. In this translation, the high-level type capabilities are implemented as term capabilities protected by encryption keys only known to the intended receivers. As such, the implementation is effective even when the compiled, low-level principals are deployed in open contexts for which no assumption on trust and behavior may be made. Our technique and results draw on, and extend, previous work on secure implementation of channel abstractions in a dialect of the join calculus [2]. In particular, our translation preserves the forward secrecy of communications in a calculus that includes matching and supports the dynamic exchange of write and read access-rights among processes. We establish the adequacy and full abstraction of the implementation by contrasting the untyped equivalences of the low-level cryptographic calculus, with the typed equivalences of the high-level source calculus.
引用
收藏
页码:251 / 262
页数:12
相关论文
共 50 条
  • [21] Intrusion-resilient secure channels (Extended abstract)
    Itkis, G
    McNerney, R
    Russell, S
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2005, 3531 : 238 - 253
  • [22] New constructions for secure hash functions (Extended abstract)
    Aiello, W
    Haber, S
    Venkatesan, R
    FAST SOFTWARE ENCRYPTION, 1998, 1372 : 150 - 167
  • [23] Side-channel issues for designing secure hardware implementations
    Batina, L
    Mentens, N
    Verbauwhede, I
    11TH IEEE INTERNATIONAL ON-LINE TESTING SYMPOSIUM, 2005, : 118 - 121
  • [25] Simulating Noisy Channel Interaction [Extended Abstract]
    Braverman, Mark
    Mao, Jieming
    PROCEEDINGS OF THE 6TH INNOVATIONS IN THEORETICAL COMPUTER SCIENCE (ITCS'15), 2015, : 21 - 30
  • [26] One-round secure computation and secure autonomous mobile agents (Extended abstract)
    Cachin, C
    Camenisch, J
    Kilian, J
    Müller, J
    AUTOMATA LANGUAGES AND PROGRAMMING, 2000, 1853 : 512 - 523
  • [27] Efficient secure multi-party computation - (Extended abstract)
    Hirt, M
    Maurer, U
    Przydatek, B
    ADVANCES IN CRYPTOLOGY ASIACRYPT 2000, PROCEEDINGS, 2000, 1976 : 143 - 161
  • [28] Protocols for collusion-secure asymmetric fingerprinting (extended abstract)
    Biehl, I
    Meyer, B
    STACS 97 - 14TH ANNUAL SYMPOSIUM ON THEORETICAL ASPECTS OF COMPUTER SCIENCE, 1997, 1200 : 399 - 412
  • [29] Extended abstract: Forward-secure sequential aggregate authentication
    Ma, Di
    Tsudik, Gene
    2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 86 - +
  • [30] Secure multiparty computations using the 15 puzzle (Extended abstract)
    Mizuki, Takaaki
    Kugimoto, Yoshinori
    Sone, Hideaki
    COMBINATORIAL OPTIMIZATION AND APPLICATIONS, PROCEEDINGS, 2007, 4616 : 255 - +