Specifying and implementing privacy-preserving cryptographic protocols

被引:0
|
作者
Theodoros Balopoulos
Stefanos Gritzalis
Sokratis K. Katsikas
机构
[1] University of the Aegean,Laboratory of Information and Communication Systems Security, Department of Information and Communication Systems Engineering
关键词
Specification of Security Protocols; Privacy; Linkability; Dolev–Yao Intruder; Security-typed language; Typed MSR; Jif;
D O I
暂无
中图分类号
学科分类号
摘要
Formal methods are an important tool for designing secure cryptographic protocols. However, the existing work on formal methods does not cover privacy-preserving protocols as much as other types of protocols. Furthermore, privacy-related properties, such as unlinkability, are not always easy or even possible to prove statically, but need to be checked dynamically during the protocol’s execution. In this paper, we demonstrate how, starting from an informal description of a privacy-preserving protocol in natural language, one may use a modified and extended version of the Typed MSR language to create a formal specification of this protocol, typed in a linkability-oriented type system, and then use this specification to reach an implementation of this protocol in Jif, in such a way that privacy vulnerabilities can be detected with a mixture of static and runtime checks.
引用
收藏
页码:395 / 420
页数:25
相关论文
共 50 条
  • [1] Specifying and implementing privacy-preserving cryptographic protocols
    Balopoulos, Theodoros
    Gritzalis, Stefanos
    Katsikas, Sokratis K.
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2008, 7 (06) : 395 - 420
  • [2] Specifying privacy-preserving protocols in typed MSR
    Balopoulos, T
    Gritzalis, S
    Katsikas, SK
    [J]. COMPUTER STANDARDS & INTERFACES, 2005, 27 (05) : 501 - 512
  • [3] On Limitations and Alternatives of Privacy-Preserving Cryptographic Protocols for Genomic Data
    Teruya, Tadanori
    Nuida, Koji
    Shimizu, Kana
    Hanaoka, Goichiro
    [J]. ADVANCES IN INFORMATION AND COMPUTER SECURITY (IWSEC 2015), 2015, 9241 : 242 - 261
  • [4] CRYPTOGRAPHIC ALGORITHMS FOR PRIVACY-PRESERVING ONLINE APPLICATIONS
    Li, Ruinian
    Xiao, Yinhao
    Zhang, Cheng
    Song, Tianyi
    Hu, Chunqiang
    [J]. MATHEMATICAL FOUNDATIONS OF COMPUTING, 2018, 1 (04): : 311 - 330
  • [5] Cryptographic Approaches for Privacy-Preserving Machine Learning
    Jiang Han
    Liu Yiran
    Song Xiangfu
    Wang Hao
    Zheng Zhihua
    Xu Qiuliang
    [J]. JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2020, 42 (05) : 1068 - 1078
  • [6] Verifying Indistinguishability of Privacy-Preserving Protocols
    Linvill, Kirby
    Kaki, Gowtham
    Wustrow, Eric
    [J]. PROCEEDINGS OF THE ACM ON PROGRAMMING LANGUAGES-PACMPL, 2023, 7 (OOPSLA):
  • [7] Towards practical privacy-preserving protocols
    Demmler, Daniel
    [J]. IT-INFORMATION TECHNOLOGY, 2022, 64 (1-2): : 49 - 53
  • [8] Protocols for Privacy-Preserving DBSCAN Clustering
    Xu Wei-jiang
    Huang Liu-sheng
    Luo Yong-long
    Yao Yi-fei
    Jing Wei-wei
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2007, 1 (01): : 45 - 56
  • [9] Privacy-Preserving Authentication Protocols in Vanet
    Nath H.J.
    Choudhury H.
    [J]. SN Computer Science, 4 (5)
  • [10] Cryptographic Primitives in Privacy-Preserving Machine Learning: A Survey
    Qin, Hong
    He, Debiao
    Feng, Qi
    Khan, Muhammad Khurram
    Luo, Min
    Choo, Kim-Kwang Raymond
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2024, 36 (05) : 1919 - 1934