Hiding Names: Private Authentication in the Applied Pi Calculus
نویسندگان
چکیده
We present the analysis of a protocol for private authentication in the applied pi calculus. We treat authenticity and secrecy properties of the protocol. Although such properties are fairly standard, their formulation in the applied pi calculus makes an original use of process equivalences. In addition, we treat identity-protection properties, which are a delicate concern in several recent protocol designs.
منابع مشابه
Applied pi calculus
The applied pi calculus is a language for modelling security protocols. It is an extension of the pi calculus, a language for studying concurrency and process interaction. This chapter presents the applied pi calculus in a tutorial style. It describes reachability, correspondence, and observational equivalence properties, with examples showing how to model secrecy, authentication, and privacy a...
متن کاملManipulating Trees with Hidden Labels
1.1 Languages for Semistructured Data XML and semistructured data [1] are inspiring a new generation of programming and query languages based on more flexible type systems [26, 5, 6, 15]. Traditional type systems are grounded on mathematical constructions such as cartesian products, disjoint unions, function spaces, and recursive types. The type systems for semistructured data, in contrast, res...
متن کاملStateful Applied Pi Calculus
We extend the applied pi calculus with state cells, which are used toreason about protocols that store persistent information. Examples are protocolsinvolving databases or hardware modules with internal state. We distinguish be-tween private state cells, which are not available to the attacker, and public statecells, which arise when a private state cell is compromised by the at...
متن کاملInformation Hiding in the Join Calculus
We aim to provide information hiding support in concurrent object-oriented programming languages. We study the issue both at the object level and class level, in the context of an object-oriented extension of the Join calculus — a process calculus in the tradition of the π-calculus. In this extended abstract we focus on the class level and design a new hiding operation on classes, aimed at prev...
متن کاملBiometric Transaction Authentication Protocol: Formal Model Verification and "Four-Eyes" Principle Extension
The BTA protocol for biometric authentication of online banking transactions is extended to allow for multiple person authenticated transactions. In addition a formal specification is given, the protocol is modelled in the applied pi calculus and the security properties of data and person authentication as well as non-repudiation are verified using the tool ProVerif.
متن کامل