Secure Composition of Cryptographic Protocols

نویسنده

  • Vipul Goyal
چکیده

General positive results for secure computation were obtained more than two decades ago. These results were for the setting where each protocol execution is done in isolation.With the proliferation of the network setting (and especially the internet), an ambitious effort to generalize these results and obtain concurrently secure protocols was started. However it was soon shown that designing secure protocols in the concurrent setting is unfortunately impossible in general. In this talk, we will first describe the so called chosen protocol attack. This is an explicit attack which establishes general impossibility of designing secure protocols in the concurrent setting. The negative results hold for the so called plain model where there is no trusted party, no honest majority, etc. On the other hand, several positive results for protocols composition have been established in various related settings (which are either weaker or incomparable). A few examples are the setting of resettable computation (where the parties may not be able to keep state during the protocol execution and may be run several times with the same random tape), bounded concurrent secure computation (where there is an apriori bound on the total number of concurrent sessions), standalone protocol execution with man-in-the-middle (i.e., the setting of nonmalleable protocols), the single input setting (where the honest party uses the same input in all polynomially unbounded concurrent protocol executions), etc. We will survey known results as well various open problems in each of the above settings. We also given an overview of an emerging technique which has been used to construct secure protocols in several of these settings. We will focus on the plain model throughout the talk.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

S ¸ Tefan Ciobâc˘ A, Véronique Cortier Protocol Composition for Arbitrary Primitives Protocol Composition for Arbitrary Primitives

We study the composition of security protocols when protocols share secrets such as keys. We show (in a Dolev-Yao model) that if two protocols use disjoint cryptographic primitives, their composition is secure if the individual protocols are secure, even if they share data. Our result holds for any cryptographic primitives that can be modeled using equational theories, such as encryption, signa...

متن کامل

Secure Computation with Fixed-Point Numbers

Secure computation is a promising approach to business problems in which several parties want to run a joint application and cannot reveal their inputs. Secure computation preserves the privacy of input data using cryptographic protocols, allowing the parties to obtain the benefits of data sharing and at the same time avoid the associated risks. These business applications need protocols that s...

متن کامل

Leakage Quantification of Cryptographic Operations

Perfectly secure protocols are often too inefficient performance wise to be used in a practical setting. On the other hand, an insecure (but faster) protocol might be deemed secure for a particular setting. Recent research has thus focused on precise leakage quantification of a security protocol. In this context, we first give precise leakage quantification of a basic cryptographic primitive, t...

متن کامل

Composing Protocols with Randomized Actions

Recently, several composition results have been established, showing that two cryptographic protocols proven secure against a DolevYao adversary continue to afford the same security guarantees when composed together, provided the protocol messages are tagged with the information of which protocol they belong to. The key technical tool used to establish this guarantee is a separation result whic...

متن کامل

Layered Specifications Framework for Analysis of Secure Protocols

We present a framework for specification and analysis of layered distributed algorithms, especially cryptographic protocols, with emphasis on security and fault-tolerance. Layered specifications is standard engineering practice, e.g. in networking (the OSI and TCP/IP protocol stacks). Layered specifications allow modular design of each layer, proving layer i meets specifications speci assuming ...

متن کامل

Verification of anonymity properties in e-voting protocols

The language of this thesis is English because learning French is still work in progress for me. In this thesis, we have approached two problems related to the automatic verification of anonymity-like properties in the passive case. The first problem concerns the security of the composition of two protocols under a shared secret. We ask ourselves under which circumstances is the parallel compos...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011