Typing and Compositionality for Security Protocols: A Generalization to the Geometric Fragment

被引:8
|
作者
Almousa, Omar [1 ]
Modersheim, Sebastian [1 ]
Modesti, Paolo [2 ]
Vigano, Luca [3 ]
机构
[1] DTU Compute, Lyngby, Denmark
[2] Newcastle Univ, Sch Comp Sci, Newcastle Upon Tyne NE1 7RU, Tyne & Wear, England
[3] Kings Coll London, Dept Informat, London WC2R 2LS, England
来源
关键词
BOUNDING MESSAGES; VERIFICATION;
D O I
10.1007/978-3-319-24177-7_11
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We integrate, and improve upon, prior relative soundness results of two kinds. The first kind are typing results showing that any security protocol that fulfils a number of sufficient conditions has an attack if it has a well-typed attack. The second kind considers the parallel composition of protocols, showing that when running two protocols in parallel allows for an attack, then at least one of the protocols has an attack in isolation. The most important generalization over previous work is the support for all security properties of the geometric fragment.
引用
收藏
页码:209 / 229
页数:21
相关论文
共 50 条
  • [1] Compositionality of Security Protocols: A Research Agenda
    Cremers, Cas
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2006, 142 : 99 - 110
  • [2] Authenticity by typing for security protocols
    Gordon, AD
    Jeffrey, A
    14TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2001, : 145 - 159
  • [3] Secrecy by typing in security protocols
    Abadi, M
    JOURNAL OF THE ACM, 1999, 46 (05) : 749 - 786
  • [4] Typing Messages for Free in Security Protocols
    Chretien, Remy
    Cortier, Veronique
    Dallon, Antoine
    Delaune, Stephanie
    ACM TRANSACTIONS ON COMPUTATIONAL LOGIC, 2020, 21 (01)
  • [5] Differential Privacy by Typing in Security Protocols
    Eigner, Fabienne
    Maffei, Matteo
    2013 IEEE 26TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2013, : 272 - 286
  • [6] Compositionality and Generalization in Emergent Languages
    Chaabouni, Rahma
    Kharitonov, Eugene
    Bouchacourt, Diane
    Dupoux, Emmanuel
    Baroni, Marco
    58TH ANNUAL MEETING OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS (ACL 2020), 2020, : 4427 - 4442
  • [7] Formalizing and Proving a Typing Result for Security Protocols in Isabelle/HOL
    Hess, Andreas Viktor
    Modersheim, Sebastian
    2017 IEEE 30TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2017, : 451 - 463
  • [8] Generalization of the selective-ID security model for HIBE protocols
    Chatterjee, Sanjit
    Sarkar, Palash
    PUBLIC KEY CRYPTOGRAPHY - PKC 2006, PROCEEDINGS, 2006, 3958 : 241 - 256
  • [9] Generalization of the Selective-ID security model for HIBS Protocols
    Li, Jin
    Chen, Xiaofeng
    Zhang, Fangguo
    Wang, Yanming
    COMPUTATIONAL INTELLIGENCE AND SECURITY, 2007, 4456 : 894 - +
  • [10] Generalization of the selective-ID security model for HIBS protocols
    Li, Jin
    Chen, Xiaofeng
    Zhang, Fangguo
    Wang, Yanming
    2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1583 - 1586