Secrecy and Group Creation

نویسندگان

  • Luca Cardelli
  • Giorgio Ghelli
  • Andrew D. Gordon
چکیده

We add an operation of group creation to the typed πcalculus, where a group is a type for channels. Creation of fresh groups has the effect of statically preventing certain communications, and can block the accidental or malicious leakage of secrets. Intuitively, no channel belonging to a fresh group can be received by processes outside the initial scope of the group, even if those processes are untyped. We formalize this intuition by adapting a notion of secrecy introduced by Abadi, and proving a preservation of secrecy property.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secrecy Group Creation with Symmetric-Key Cryptography

We lift Cardelli, Ghelli and Gordon’s secrecy group creation operator [1] to a relative of the spicalculus that supports symmetric key cryptography, and show a natural extension of the associated type system. We then formulate a notion of secrecy preservation in the presence of cryptography, and prove that well-typed processes in the extended type system preserve secrecy of declared secrets, ev...

متن کامل

Secrecy as a Means of Control: Coercion versus Groupthink

In a society where knowledge is power, the ability to control the distribution of knowledge, what people know and when they know it, becomes the ultimate power. Secrecy is thus a means to an end: the end is controlling other people by controlling what information they have (or do not have). In STS.011, we have read cases illustrating two different ways in which secrecy facilitated control. In s...

متن کامل

Achievable Secrecy Rate Regions of State Dependent Causal Cognitive Interference Channel

In this paper, the secrecy problem in the state dependent causal cognitive interference channel is studied. The channel state is non-causally known at the cognitive encoder. The message of the cognitive encoder must be kept secret from the primary receiver. We use a coding scheme which is a combination of compress-and-forward strategy with Marton coding, Gel’fand-Pinsker coding and Wyner’s wire...

متن کامل

Efficient Identity-based Authenticated Key Agreement Protocol with PKG Forward Secrecy

For an identity-based authenticated key agreement (IDAK) protocol, PKG forward secrecy is the strongest notion of forward secrecy, which is about the security of previously established session keys after the master secret key of the Private Key Generatior (PKG) is compromised. In this paper, we put forward a new identity-based authenticated key agreement protocol which achieves PKG forward secr...

متن کامل

The Questionable Case for Federalizing Trade Secrecy

Trade secrecy is unique among the major forms of intellectual property as not being primarily governed by a federal statute. Unlike patents and copyrights, trade secrecy is a creation of state law, arising in the nineteenth century out of a variety of common law to become a separate source of protection against the improper acquisition, disclosure, and use of commercially-valuable information t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Inf. Comput.

دوره 196  شماره 

صفحات  -

تاریخ انتشار 2000