Computational probabilistic noninterference

被引:0
|
作者
Michael Backes
Birgit Pfitzmann
机构
[1] IBM Zurich Research Laboratory,
关键词
Security; Cryptography; Non-interference; Information flow; Simulatability;
D O I
10.1007/s10207-004-0039-7
中图分类号
学科分类号
摘要
Information flow and noninterference are popular concepts for expressing confidentiality and integrity properties. We present the first general definition of probabilistic noninterference in reactive systems that includes a computational case. This case is essential for coping with real cryptography since noninterference properties can usually only be guaranteed if the underlying cryptographic primitives have not been broken. This might happen, but only with negligible probability. We show that our noninterference definition is maintained under simulatability, the notion of secure implementation of modern cryptography. This allows secure composition of systems and yields a general strategy for including cryptographic primitives in information-flow proofs. As an example we study a cryptographic firewall guarding two honest users from their environment.
引用
收藏
页码:42 / 60
页数:18
相关论文
共 50 条
  • [21] What is intransitive noninterference?
    Roscoe, AW
    Goldsmith, MH
    PROCEEDINGS OF THE 12TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, 1999, : 228 - 238
  • [22] A theory of noninterference for the π-calculus
    Crafa, S
    Rossi, S
    TRUSTWORTHY GLOBAL COMPUTING, 2005, 3705 : 2 - 18
  • [23] The Complexity of Intransitive Noninterference
    Eggert, Sebastian
    van der Meyden, Ron
    Schnoor, Henning
    Wilke, Thomas
    2011 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2011), 2011, : 196 - 211
  • [24] What is intransitive noninterference?
    Roscoe, A.W.
    Goldsmith, M.H.
    Proceedings of the Computer Security Foundations Workshop, 1999, : 228 - 238
  • [25] Testing noninterference, quickly
    Hritcu, Catalin
    Lampropoulos, Leonidas
    Spector-Zabusky, Antal
    De Amorim, Arthur Azevedo
    Denes, Maxime
    Hughes, John
    Pierce, Benjamin C.
    Vytiniotis, Dimitrios
    JOURNAL OF FUNCTIONAL PROGRAMMING, 2016, 26
  • [26] Noninterference model for integrity
    Zhang, Fan
    Chen, Shu
    Sang, Yong-Xuan
    You, Lin
    Tongxin Xuebao/Journal on Communications, 2011, 32 (10): : 78 - 85
  • [27] Noninterference and intrusion detection
    Ko, C
    Redmond, T
    2002 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2002, : 177 - 187
  • [28] Polymorphic Relaxed Noninterference
    Cruz, Raimil
    Tanter, Eric
    2019 IEEE SECURE DEVELOPMENT (SECDEV 2019), 2019, : 101 - 113
  • [29] Noninterference for concurrent programs
    Boudol, G
    Castellani, I
    AUTOMATA LANGUAGES AND PROGRAMMING, PROCEEDING, 2001, 2076 : 382 - 395
  • [30] THREAD ALGEBRA FOR NONINTERFERENCE
    Vu, Thuy Duong
    RAIRO-THEORETICAL INFORMATICS AND APPLICATIONS, 2009, 43 (02): : 249 - 268