A General Composition Theorem for Secure Reactive Systems
نویسندگان
چکیده
M. Naor (Ed.): TCC 2004, LCNS 2951, pages 336 352, February 2004. c © Springer-Verlag Berlin Heidelberg 2004. Abstract. We consider compositional properties of reactive systems that are secure in a cryptographic sense. We follow the well-known simulatability approach of modern cryptography, i.e., the specification is an ideal system and a real system should in some sense simulate this ideal one. We show that if a system consists of a polynomial number of arbitrary ideal subsystems such that each of them has a secure implementation in the sense of blackbox simulatability, then one can securely replace all ideal subsystems with their respective secure counterparts without destroying the blackbox simulatability relation. We further prove our theorem for universal simulatability by showing that blackbox simulatability implies universal simulatability under reasonable assumptions. We show all our results with concrete security.
منابع مشابه
A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission
We present a rigorous model for secure reactive systems in asynchronous networks with a sound cryptographic semantics, supporting abstract specifications and the composition of secure systems. This enables modular proofs of security, which is essential in bridging the gap between the rigorous proof techniques of cryptography and toolsupported formal proof techniques. The model follows the gener...
متن کاملFinal report on verification and assessment
MAFTIA workpackage 6 is concerned with the rigorous definition of core MAFTIA concepts, and the verification and assessment of the work on dependable middle-ware. In the former MAFTIA deliverables D4 [1] and D8 [2], we presented general rigorous models for the security of synchronous and asynchronous reactive systems. These models comprised various types of faults (attacks) and topology as cons...
متن کاملCryptographic Semantics for the Algebraic Models
MAFTIA’s Work-package 6 is pursuing the overall goal of “rigorously defining the basic concepts developed by MAFTIA, and verifying results of the work on dependable middle-ware.” In the former MAFTIA deliverable D4, we presented a general rigorous model for the security of reactive systems. This model comprised various types of faults (attacks) and topology as considered in MAFTIA, but was rest...
متن کاملA New Approach for Accurate Pricing of Reactive Power and Its Application to Cost Allocation in Deregulated Electricity Markets
Reactive power management plays an essential role in the secure operation of the power system as an ancillary service. Although in electricity markets, the particular attention is paid to active power, the reactive power also plays an important on total generation costs of electricity. On the other hand, as it is mainly confined to local consumption, to avoid market power and maintain the se...
متن کاملOn the Notion of Statistical Security in Simulatability Definitions
We investigate the definition of statistical security (i.e., security against unbounded adversaries) in the framework of reactive simulatability. This framework allows to formulate and analyze multi-party protocols modularly by providing a composition theorem for protocols. However, we show that the notion of statistical security, as defined by Backes, Pfitzmann and Waidner for the reactive sim...
متن کامل