Secure Composition of Cryptographic Protocols
نویسنده
چکیده
General positive results for secure computation were obtained more than two decades ago. These results were for the setting where each protocol execution is done in isolation.With the proliferation of the network setting (and especially the internet), an ambitious effort to generalize these results and obtain concurrently secure protocols was started. However it was soon shown that designing secure protocols in the concurrent setting is unfortunately impossible in general. In this talk, we will first describe the so called chosen protocol attack. This is an explicit attack which establishes general impossibility of designing secure protocols in the concurrent setting. The negative results hold for the so called plain model where there is no trusted party, no honest majority, etc. On the other hand, several positive results for protocols composition have been established in various related settings (which are either weaker or incomparable). A few examples are the setting of resettable computation (where the parties may not be able to keep state during the protocol execution and may be run several times with the same random tape), bounded concurrent secure computation (where there is an apriori bound on the total number of concurrent sessions), standalone protocol execution with man-in-the-middle (i.e., the setting of nonmalleable protocols), the single input setting (where the honest party uses the same input in all polynomially unbounded concurrent protocol executions), etc. We will survey known results as well various open problems in each of the above settings. We also given an overview of an emerging technique which has been used to construct secure protocols in several of these settings. We will focus on the plain model throughout the talk.
منابع مشابه
S ¸ Tefan Ciobâc˘ A, Véronique Cortier Protocol Composition for Arbitrary Primitives Protocol Composition for Arbitrary Primitives
We study the composition of security protocols when protocols share secrets such as keys. We show (in a Dolev-Yao model) that if two protocols use disjoint cryptographic primitives, their composition is secure if the individual protocols are secure, even if they share data. Our result holds for any cryptographic primitives that can be modeled using equational theories, such as encryption, signa...
متن کاملSecure Computation with Fixed-Point Numbers
Secure computation is a promising approach to business problems in which several parties want to run a joint application and cannot reveal their inputs. Secure computation preserves the privacy of input data using cryptographic protocols, allowing the parties to obtain the benefits of data sharing and at the same time avoid the associated risks. These business applications need protocols that s...
متن کاملLeakage Quantification of Cryptographic Operations
Perfectly secure protocols are often too inefficient performance wise to be used in a practical setting. On the other hand, an insecure (but faster) protocol might be deemed secure for a particular setting. Recent research has thus focused on precise leakage quantification of a security protocol. In this context, we first give precise leakage quantification of a basic cryptographic primitive, t...
متن کاملComposing Protocols with Randomized Actions
Recently, several composition results have been established, showing that two cryptographic protocols proven secure against a DolevYao adversary continue to afford the same security guarantees when composed together, provided the protocol messages are tagged with the information of which protocol they belong to. The key technical tool used to establish this guarantee is a separation result whic...
متن کاملLayered Specifications Framework for Analysis of Secure Protocols
We present a framework for specification and analysis of layered distributed algorithms, especially cryptographic protocols, with emphasis on security and fault-tolerance. Layered specifications is standard engineering practice, e.g. in networking (the OSI and TCP/IP protocol stacks). Layered specifications allow modular design of each layer, proving layer i meets specifications speci assuming ...
متن کاملVerification of anonymity properties in e-voting protocols
The language of this thesis is English because learning French is still work in progress for me. In this thesis, we have approached two problems related to the automatic verification of anonymity-like properties in the passive case. The first problem concerns the security of the composition of two protocols under a shared secret. We ask ourselves under which circumstances is the parallel compos...
متن کامل