Computational probabilistic non-interference

被引:0
|
作者
Backes, M [1 ]
Pfitzmann, B
机构
[1] Univ Saarland, D-6600 Saarbrucken, Germany
[2] IBM Corp, Zurich Res Lab, CH-8803 Ruschlikon, Switzerland
来源
COMPUTER SECURITY - ESORICS 2002, PROCEEDINGS | 2002年 / 2502卷
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In recent times information flow and non-interference have become very popular concepts for expressing both integrity and privacy properties. We present the first general definition of probabilistic non-interference in reactive systems which includes a computational case. This case is essential to cope with real cryptography since non-interference properties can usually only be guaranteed if the underlying cryptographic primitives have not been broken. This might happen, but only with negligible probability. Furthermore, our definition links noninterference with the common approach of simulatability that modern cryptography often uses. We show that our definition is maintained under simulatability, which allows secure composition of systems, and we present a general strategy how cryptographic primitives can be included in information flow proofs. As an example we present an abstract specification and a possible implementation of a cryptographic firewall guarding two honest users from their environment.
引用
收藏
页码:1 / 23
页数:23
相关论文
共 50 条
  • [31] Non-interference models and subliminal channels
    Grusho, A.A.
    Shumitskaya, E.L.
    Discrete Mathematics and Applications, 2002, 12 (01): : 9 - 14
  • [32] The PER model of abstract non-interference
    Hunt, S
    Mastroeni, I
    STATIC ANALYSIS, PROCEEDINGS, 2005, 3672 : 171 - 185
  • [33] A decidable notion of timed non-interference
    Barbuti, R
    Tesei, L
    FUNDAMENTA INFORMATICAE, 2003, 54 (2-3) : 137 - 150
  • [34] The Myth of Academics' Non-interference in Legislatures
    Zelizer, Adam
    POLITICAL STUDIES REVIEW, 2022, 20 (02) : 228 - 235
  • [35] Non-Interference for Deterministic Interactive Programs
    Clark, David
    Hunt, Sebastian
    FORMAL ASPECTS IN SECURITY AND TRUST, 2009, 5491 : 50 - +
  • [36] Class-level Non-Interference
    Damiano Zanardini
    New Generation Computing, 2012, 30 : 241 - 270
  • [37] China Debates the Non-Interference Principle
    Zheng, Chen
    CHINESE JOURNAL OF INTERNATIONAL POLITICS, 2016, 9 (03): : 349 - 374
  • [38] Intransitive non-interference for cryptographic purposes
    Backes, M
    Pfitzmann, B
    2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2003, : 140 - 152
  • [39] A notion of non-interference for timed automata
    Barbuti, R
    De Francesco, N
    Santone, A
    Tesei, L
    FUNDAMENTA INFORMATICAE, 2002, 51 (1-2) : 1 - 11
  • [40] DeFi Composability as MEV Non-interference
    Bartoletti, Massimo
    Marchesin, Riccardo
    Zunino, Roberto
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2024, PT II, 2025, 14745 : 369 - 387