A General Composition Theorem for Secure Reactive Systems

نویسندگان

  • Michael Backes
  • Birgit Pfitzmann
  • Michael Waidner
چکیده

M. Naor (Ed.): TCC 2004, LCNS 2951, pages 336 352, February 2004. c © Springer-Verlag Berlin Heidelberg 2004. Abstract. We consider compositional properties of reactive systems that are secure in a cryptographic sense. We follow the well-known simulatability approach of modern cryptography, i.e., the specification is an ideal system and a real system should in some sense simulate this ideal one. We show that if a system consists of a polynomial number of arbitrary ideal subsystems such that each of them has a secure implementation in the sense of blackbox simulatability, then one can securely replace all ideal subsystems with their respective secure counterparts without destroying the blackbox simulatability relation. We further prove our theorem for universal simulatability by showing that blackbox simulatability implies universal simulatability under reasonable assumptions. We show all our results with concrete security.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission

We present a rigorous model for secure reactive systems in asynchronous networks with a sound cryptographic semantics, supporting abstract specifications and the composition of secure systems. This enables modular proofs of security, which is essential in bridging the gap between the rigorous proof techniques of cryptography and toolsupported formal proof techniques. The model follows the gener...

متن کامل

Final report on verification and assessment

MAFTIA workpackage 6 is concerned with the rigorous definition of core MAFTIA concepts, and the verification and assessment of the work on dependable middle-ware. In the former MAFTIA deliverables D4 [1] and D8 [2], we presented general rigorous models for the security of synchronous and asynchronous reactive systems. These models comprised various types of faults (attacks) and topology as cons...

متن کامل

Cryptographic Semantics for the Algebraic Models

MAFTIA’s Work-package 6 is pursuing the overall goal of “rigorously defining the basic concepts developed by MAFTIA, and verifying results of the work on dependable middle-ware.” In the former MAFTIA deliverable D4, we presented a general rigorous model for the security of reactive systems. This model comprised various types of faults (attacks) and topology as considered in MAFTIA, but was rest...

متن کامل

A New Approach for Accurate Pricing of Reactive Power and Its Application to Cost Allocation in Deregulated Electricity Markets

Reactive power management plays an essential role in the secure operation of the power system as an ancillary service. Although in electricity markets, the particular attention is paid to active power, the reactive power also plays an important on total generation costs of electricity. On the other hand, as it is mainly confined to local consumption, to avoid market power and maintain the se...

متن کامل

On the Notion of Statistical Security in Simulatability Definitions

We investigate the definition of statistical security (i.e., security against unbounded adversaries) in the framework of reactive simulatability. This framework allows to formulate and analyze multi-party protocols modularly by providing a composition theorem for protocols. However, we show that the notion of statistical security, as defined by Backes, Pfitzmann and Waidner for the reactive sim...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004