Game semantics model for security protocols

被引:0
|
作者
Debbabi, M [1 ]
Saleh, M [1 ]
机构
[1] Concordia Univ, Comp Secur Lab, Concordia Inst Informat Syst Engn, Montreal, PQ, Canada
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Our aim is to present a game semantics model for the specification of security protocols. Game semantics has been used to give an operational flavor to denotational semantics, thereby combining the best of both worlds by having an elegant mathematical structure and at the same time describing steps of execution. Game semantics was successfully used to prove full abstraction of PCF and has since been used to describe the semantics of a variety of programming languages. It fits naturally in the framework of security protocols as the interactions between communicating parties can be described as moves in a game, where honest agents are the players and the intruder is the opponent. We propose a game-based calculus for the specification of security protocols. First, we define games that represent interactions in security protocols, these games are then used to ascribe denotational semantics to security protocols.
引用
收藏
页码:125 / 140
页数:16
相关论文
共 50 条
  • [1] Operational semantics of security protocols
    Cremers, C
    Mauw, S
    SCENARIOS: MODELS, TRANSFORMATIONS AND TOOLS, 2005, 3466 : 66 - 89
  • [2] Update semantics of security protocols
    Hommersom, A
    Meyer, JJ
    De Vink, E
    SYNTHESE, 2004, 142 (02) : 229 - 267
  • [3] Update Semantics of Security Protocols
    Arjen Hommersom
    John-jules Meyer
    Erik De vink
    Synthese, 2004, 142 : 229 - 267
  • [4] Semantics and logic Efor security protocols
    Jacobs, Bart
    Hasuo, Ichiro
    JOURNAL OF COMPUTER SECURITY, 2009, 17 (06) : 909 - 944
  • [5] On the semantics of Alice&Bob specifications of security protocols
    Caleiro, Carlos
    Vigano, Luca
    Basin, David
    THEORETICAL COMPUTER SCIENCE, 2006, 367 (1-2) : 88 - 122
  • [6] A verification logic for security protocols based on computational semantics
    Tang, Chao-Jing, 1600, Chinese Institute of Electronics (42):
  • [7] Game Semantics in the Nominal Model
    Gabbay, Murdoch
    Ghica, Dan
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2012, 286 : 173 - 189
  • [8] Game-Theoretic Security of Commitment Protocols under a Realistic Cost Model
    Komatsubara, Tsuyoshi
    Manabe, Yoshifumi
    IEEE 30TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS IEEE AINA 2016, 2016, : 776 - 783
  • [9] A Formally Verified Scheme for Security Protocols with the Operational Semantics of Strand Space
    Li, Yongjian
    Jiang, Hongjian
    Zhao, Yongxin
    THEORETICAL ASPECTS OF SOFTWARE ENGINEERING, TASE 2024, 2024, 14777 : 306 - 323
  • [10] Game-Based Automated Security Proofs for Cryptographic Protocols
    Gu Chunxiang
    Guang Yan
    Zhu Yuefei
    CHINA COMMUNICATIONS, 2011, 8 (04) : 50 - 57