Trusted Multiplexing of Cryptographic Protocols

نویسندگان

  • Jay A. McCarthy
  • Shriram Krishnamurthi
چکیده

We present an analysis that determines when it is possible to multiplex a pair of cryptographic protocols. We present a transformation that improves the coverage of this analysis on common protocol formulations. We discuss the gap between the merely possible and the pragmatic through an optimization that informs a multiplexer. We also address the security ramifications of trusting external parties for this task and evaluate our work on a large repository of cryptographic protocols. We have formally verified this work using the Coq proof

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Deciding Epistemic and Strategic Properties of Cryptographic Protocols

We propose a new, widely applicable model for analyzing knowledge-based (epistemic) and strategic properties of cryptographic protocols. We prove that the corresponding model checking problem with respect to an expressive epistemic strategic logic is decidable. As corollaries, we obtain decidability of complex security properties including coercion-resistance of voting protocols, accountability...

متن کامل

Mobile Agent Security Through Multi-Agent Cryptographic Protocols

We consider the problem of keeping sensitive data and algorithms contained in a mobile agent from discovery and exploitation by a malicious host. The focus in this paper is on rigorous techniques based on cryptographic protocols. Algesheimer, Cachin, Camenisch, and Karjoth (IEEE Security and Privacy, 2001) devised a secure agent protocol in such a setting, where agents and hosts are mutually di...

متن کامل

A Zero-One Law for Cryptographic Complexity with Respect to Computational UC Security

It is well-known that most cryptographic tasks do not have universally composable (UC) secure protocols, if no trusted setup is available in the framework. On the other hand, if a task like fair coin-tossing is available as a trusted setup, then all cryptographic tasks have UCsecure protocols. What other trusted setups allow UC-secure protocols for all tasks? More generally, given a particular ...

متن کامل

Report on Models and Definitions for Cryptographic Protocols

This report focuses on models and definitions for cryptographic protocols. We consider different notions of security and discuss some of the most widely used models and set-up assumptions (e.g., random oracle, common reference string, bare public keys, trusted computing base). We consider as examples some two-party games (e.g., zero-knowledge proof systems, commitment schemes, ), present the cu...

متن کامل

Secure Implementation of Cryptographic Protocols: A Case Study of Mutual Distrust

Security protocols are critical for protecting modern communication infrastructures and are therefore subject to thorough analysis. However practical implementations of these protocols lack the same level of attention and thus may be more exposed to attacks. This paper discusses security assurance provided by security-typed languages when implementing cryptographic protocols. Our results are ba...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009