A game-theoretic framework for specification and verification of cryptographic protocols

被引:1
|
作者
Saleh, Mohamed [1 ]
Debbabi, Mourad [1 ]
机构
[1] Concordia Univ, Comp Secur Lab, Concordia Inst Informat Syst Engn, Montreal, PQ, Canada
关键词
Security protocols; Game semantics; Formal verification; Model checking;
D O I
10.1007/s00165-009-0129-4
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
We model security protocols as games using concepts of game semantics. Using this model we ascribe semantics to protocols written in the standard simple arrow notation. According to the semantics, a protocol is interpreted as a set of strategies over a game tree that represents the type of the protocol. The model uses abstract computation functions and message frames in order to model internal computations and knowledge of agents and the intruder. Moreover, in order to specify properties of the model, a logic that deals with games and strategies is developed. A tableau-based proof system is given for the logic, which can serve as a basis for a model checking algorithm. This approach allows us to model a wide range of security protocol types and verify different properties instead of using a variety of methods as is currently the practice. Furthermore, the analyzed protocols are specified using only the simple arrow notation heavily used by protocol designers and by practitioners.
引用
收藏
页码:585 / 609
页数:25
相关论文
共 50 条
  • [1] A game-theoretic model for two-party cryptographic protocols
    Caballero-Gil, P
    Hernández-Goya, C
    Bruno-Castañeda, C
    ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 2, PROCEEDINGS, 2004, : 773 - 777
  • [2] Game-Theoretic Framework for Integrity Verification in Computation Outsourcing
    Tang, Qiang
    Pejo, Balazs
    DECISION AND GAME THEORY FOR SECURITY, (GAMESEC 2016), 2016, 9996 : 472 - 473
  • [3] Game-theoretic mechanism for cryptographic protocol
    Peng, C. (sci.cgpeng@gzu.edu.cn), 1600, Science Press (51):
  • [4] Specification and Verification of Cryptographic Protocols based on TCPL
    Lei Xinfeng
    Li Xinghua
    Liu Jun
    Xiao Junmo
    ICCSSE 2009: PROCEEDINGS OF 2009 4TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, 2009, : 1216 - 1220
  • [5] An extension of duality to a game-theoretic framework
    Pavel, Lacra
    AUTOMATICA, 2007, 43 (02) : 226 - 237
  • [6] A Game-Theoretic Framework for Interference Avoidance
    Menon, R.
    MacKenzie, A. B.
    Hicks, J.
    Buehrer, R. M.
    Reed, J. H.
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2009, 57 (04) : 1087 - 1098
  • [7] Automated Game-Theoretic Verification of Security Systems
    Mu, Chunyan
    QUANTITATIVE EVALUATION OF SYSTEMS (QEST 2019), 2019, 11785 : 239 - 256
  • [8] A Game-Theoretic Model for Analyzing Fair Exchange Protocols
    Gu, Yonggen
    Shen, Zhangguo
    Xue, Deqian
    PROCEEDINGS OF THE SECOND INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, VOL I, 2009, : 509 - 513
  • [9] Distributed Protocols for Leader Election: A Game-Theoretic Perspective
    Abraham, Ittai
    Dolev, Danny
    Halpern, Joseph Y.
    ACM TRANSACTIONS ON ECONOMICS AND COMPUTATION, 2019, 7 (01)
  • [10] Distributed Protocols for Leader Election: A Game-Theoretic Perspective
    Abraham, Ittai
    Dolev, Danny
    Halpern, Joseph Y.
    DISTRIBUTED COMPUTING, 2013, 8205 : 61 - 75