L-PEP: A Logic to Reason about Privacy-Enhancing Cryptography Protocols
نویسندگان
چکیده
In recent years, many cryptography protocols have been designed, for many different scenarios, with the purpose of preserving security of communications as well as privacy and anonymity of participant entities. In general, every proposed solution has possed a real challenge to the existing formal methods of protocol analysis and verification. The main goal of this work is the proposal of a logic to reason about privacyenhancing monotonic and non–monotonic cryptography protocols. The new logic will be called L-PEP and it extends the existing Rubin’s logic of beliefs. The original publication is available at www.springerlink.com
منابع مشابه
Privacy Compliance Verification in Cryptographic Protocols
To provide privacy protection, cryptographic primitives are frequently applied to communication protocols in an open environment (e.g. the Internet). We call these protocols privacy enhancing protocols (PEPs) which constitute a class of cryptographic protocols. Proof of the security properties, in terms of the privacy compliance, of PEPs is desirable before they can be deployed. However, the tr...
متن کاملFrom Qualitative to Quantitative Proofs of Security Properties Using First-Order Conditional Logic: Abstract∗
Security protocols, such as key-exchange and keymanagement protocols, are short, but notoriously difficult to prove correct. Flaws have been found in numerous protocols, ranging from the the 802.11 Wired Equivalent Privacy (WEP) protocol used to protect link-layer communications from eavesdropping and other attacks [1] to standards and proposed standards for Secure Socket Layer [2], [3] to Kerb...
متن کاملEnhancing SVO Logic for Mobile IPv6 Security Protocols
In order to protect Mobile Internet Protocol Version 6 (MIPv6), considerable researches have been made, consequently followed by various security protocols, which are based on public key cryptography. Especially, depending on a proper address based public key method, these protocols use each node’s address as a public key certificate to authenticate its public key because no global public key i...
متن کاملEnhancing privacy of recent authentication schemes for low-cost RFID systems
Nowadays Radio Frequency Identification (RFID) systems have appeared in lots of identification and authentication applications. In some sensitive applications, providing secure and confidential communication is very important for end-users. To this aim, different RFID authentication protocols have been proposed, which have tried to provide security and privacy of RFID users. In this paper, we a...
متن کاملPrivacy by Design: On the Conformance Between Protocols and Architectures
In systems design, we generally distinguish the architecture and the protocol levels. In the context of privacy by design, in the first case, we talk about privacy architectures, which define the privacy goals and the main features of the system at high level. In the latter case, we consider the underlying concrete protocols and privacy enhancing technologies that implement the architectures. I...
متن کامل