Considering Non-Malleability in Formal Models for Cryptographic Protocols (Extended Abstract)

نویسنده

  • Carsten Rudolph
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving

In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...

متن کامل

Privacy, Abstract Encryption and Protocols: An ASM Model - Part I

We introduce an executable formal model of abstract encryption using the specification language AsmL, based on Abstract State Machines of Gurevich, providing a simple executable models for cryptographic protocols. We show strong universality properties of our descriptions of patterns, protocol roles and environment behaviors—no ASM program can do better, given the same information.

متن کامل

M2 Internship: Automatically finding attacks on security protocols

State of the art Formal methods have been used in the past decades for the verification of security protocols. Such formal mehods necessarily rely on formal models of the protocols, typically process algebras. In such formal models, the security primitives are idealized: the messages are represented by terms in a formal algebra and the possible operations on these messages are specified using e...

متن کامل

On Round-Efficient Non-Malleable Protocols

The round complexity of non-malleable commitments and non-malleable zero knowledge arguments has been an open question for long time. Very recent results of Pass [TCC 2013] and of Goyal et al. [FOCS 2014, STOC 2016], gave almost definitive answers. In this work we show how to construct round-efficient non-malleable protocols via compilers. Starting from protocols enjoying limited non-malleabili...

متن کامل

Formal Analysis of the Kerberos Authentication Protocol

FORMAL ANALYSIS OF THE KERBEROS AUTHENTICATION PROTOCOL Joe-Kai Tsay Andre Scedrov, Advisor The security of cryptographic protocols has traditionally been verified with respect to one of two mathematical models: One, known as the Dolev-Yao or symbolic model, abstracts cryptographic concepts into an algebra of symbolic messages. Methods based on the Dolev-Yao abstraction, which make use of simpl...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2000