License: Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported license (CC BY-NC-ND 3.0)
When quoting this document, please refer to the following
DOI: 10.4230/LIPIcs.FSTTCS.2009.2316
URN: urn:nbn:de:0030-drops-23163
URL: http://dagstuhl.sunsite.rwth-aachen.de/volltexte/2009/2316/
Go to the corresponding LIPIcs Volume Portal


Delaune, Stéphanie ; Kremer, Steve ; Pereira, Olivier

Simulation based security in the applied pi calculus

pdf-format:
09005.DelauneStephanie.2316.pdf (0.2 MB)


Abstract

We present a symbolic framework for refinement and composition of
security protocols. The framework uses the notion of ideal
functionalities. These are abstract systems which are secure by
construction and which can be combined into larger systems. They can
be separately refined in order to obtain concrete protocols
implementing them. Our work builds on ideas from the ``trusted
party paradigm'' used in computational cryptography models. The
underlying language we use is the applied pi calculus which is a
general language for specifying security protocols. In our framework
we can express the different standard flavours of simulation-based
security which happen to all coincide. We illustrate our framework
on an authentication functionality which can be realized using the
Needham-Schroeder-Lowe protocol. For this we need to define an
ideal functionality for asymmetric encryption and its
realization. We show a joint state result for this
functionality which allows composition (even though the same key
material is reused) using a tagging mechanism.

BibTeX - Entry

@InProceedings{delaune_et_al:LIPIcs:2009:2316,
  author =	{St{\'e}phanie Delaune and Steve Kremer and Olivier Pereira},
  title =	{{Simulation based security in the applied pi calculus}},
  booktitle =	{IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science},
  pages =	{169--180},
  series =	{Leibniz International Proceedings in Informatics (LIPIcs)},
  ISBN =	{978-3-939897-13-2},
  ISSN =	{1868-8969},
  year =	{2009},
  volume =	{4},
  editor =	{Ravi Kannan and K. Narayan Kumar},
  publisher =	{Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{http://drops.dagstuhl.de/opus/volltexte/2009/2316},
  URN =		{urn:nbn:de:0030-drops-23163},
  doi =		{10.4230/LIPIcs.FSTTCS.2009.2316},
  annote =	{Keywords: Simulation based security, applied pi calculus, joint state theorem, authentication protocols}
}

Keywords: Simulation based security, applied pi calculus, joint state theorem, authentication protocols
Collection: IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science
Issue Date: 2009
Date of publication: 14.12.2009


DROPS-Home | Fulltext Search | Imprint | Privacy Published by LZI