Computational probabilistic noninterference

被引:0
|
作者
Michael Backes
Birgit Pfitzmann
机构
[1] IBM Zurich Research Laboratory,
关键词
Security; Cryptography; Non-interference; Information flow; Simulatability;
D O I
10.1007/s10207-004-0039-7
中图分类号
学科分类号
摘要
Information flow and noninterference are popular concepts for expressing confidentiality and integrity properties. We present the first general definition of probabilistic noninterference in reactive systems that includes a computational case. This case is essential for coping with real cryptography since noninterference properties can usually only be guaranteed if the underlying cryptographic primitives have not been broken. This might happen, but only with negligible probability. We show that our noninterference definition is maintained under simulatability, the notion of secure implementation of modern cryptography. This allows secure composition of systems and yields a general strategy for including cryptographic primitives in information-flow proofs. As an example we study a cryptographic firewall guarding two honest users from their environment.
引用
收藏
页码:42 / 60
页数:18
相关论文
共 50 条
  • [41] A probabilistic metric for the validation of computational models
    Dvurecenska, Ksenija
    Graham, Steve
    Patelli, Edoardo
    Patterson, Eann A.
    ROYAL SOCIETY OPEN SCIENCE, 2018, 5 (11):
  • [42] A comparison of semantic models for noninterference
    van der Meyden, Ron
    Zhang, Chenyi
    FORMAL ASPECTS IN SECURITY AND TRUST, 2007, 4691 : 235 - +
  • [43] Reconciling noninterference and gradual typing
    de Amorim, Arthur Azevedo
    Fredrikson, Matt
    Jia, Limin
    PROCEEDINGS OF THE 35TH ANNUAL ACM/IEEE SYMPOSIUM ON LOGIC IN COMPUTER SCIENCE (LICS 2020), 2020, : 116 - 129
  • [44] Session Logical Relations for Noninterference
    Derakhshan, Farzaneh
    Balzer, Stephanie
    Jia, Limin
    2021 36TH ANNUAL ACM/IEEE SYMPOSIUM ON LOGIC IN COMPUTER SCIENCE (LICS), 2021,
  • [45] Noninterference with Local Policies
    Eggert, Sebastian
    Schnoor, Henning
    Wilke, Thomas
    MATHEMATICAL FOUNDATIONS OF COMPUTER SCIENCE 2013, 2013, 8087 : 337 - 348
  • [46] Testing Noninterference, Quickly
    Hritcu, Catalin
    Hughes, John
    Pierce, Benjamin C.
    Spector-Zabusky, Antal
    Vytiniotis, Dimitrios
    de Amorim, Arthur Azevedo
    Lampropoulos, Leonidas
    ACM SIGPLAN NOTICES, 2013, 48 (09) : 455 - 468
  • [47] Noninterference through flow analysis
    Honda, K
    Yoshida, N
    JOURNAL OF FUNCTIONAL PROGRAMMING, 2005, 15 : 293 - 349
  • [48] What, indeed, is intransitive noninterference?
    van der Meyden, Ron
    JOURNAL OF COMPUTER SECURITY, 2015, 23 (02) : 197 - 228
  • [49] Hybrid Monitors for Concurrent Noninterference
    Askarov, Aslan
    Chong, Stephen
    Mantel, Heiko
    2015 IEEE 28TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM CSF 2015, 2015, : 137 - 151
  • [50] Dynamic intransitive noninterference revisited
    Eggert, Sebastian
    van der Meyden, Ron
    FORMAL ASPECTS OF COMPUTING, 2017, 29 (06) : 1087 - 1120