Computationally Sound Compositional Logic for Security Protocols - INRIA - Institut National de Recherche en Informatique et en Automatique Accéder directement au contenu
Communication Dans Un Congrès Année : 2006

Computationally Sound Compositional Logic for Security Protocols

Résumé

We have been developing a cryptographically sound formal logic for proving protocol security properties without explicitly reasoning about probability, asymptotic complexity, or the actions of a malicious attacker. The approach rests on a probabilistic, polynomial-time semantics for a protocol security logic that was originally developed using nondeterministic symbolic semantics. This workshop presentation will discuss ways in which the computational semantics lead to different reasoning methods and report our progress to date in several directions. One significant difference between the symbolic and computational settings results from the computational difference between efficiently recognizing and efficiently producing a value. Among the more recent developments are a compositional method for proving cryptographically sound properties of key exchange protocols, and some work on secrecy properties that illustrates the computational interpretation of inductive properties of protocol roles.
Fichier principal
Vignette du fichier
paper2.pdf (120.36 Ko) Télécharger le fichier

Dates et versions

inria-00080593 , version 1 (19-06-2006)

Identifiants

  • HAL Id : inria-00080593 , version 1

Citer

Anupam Datta, Ante Derek, John C. Mitchell, Arnab Roy, Vitaly Shmatikov, et al.. Computationally Sound Compositional Logic for Security Protocols. Workshop on Formal and Computational Cryptography - FCC 2006, Véronique Cortier et Steve Kremer, Jul 2006, Venice/Italy. ⟨inria-00080593⟩
254 Consultations
196 Téléchargements

Partager

Gmail Facebook X LinkedIn More