Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2014
DOI: 10.1007/978-3-319-10181-1_17
|View full text |Cite
|
Sign up to set email alerts
|

A Hybrid Analysis for Security Protocols with State

Abstract: Cryptographic protocols rely on message-passing to coordinate activity among principals. Many richly developed tools, based on wellunderstood foundations, are available for the design and analysis of pure message-passing protocols. However, in many protocols, a principal uses non-local, mutable state to coordinate its local sessions. Cross-session state poses difficulties for protocol analysis tools.We provide a framework for modeling stateful protocols, and a hybrid analysis method. We leverage theorem-provin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 14 publications
(11 citation statements)
references
References 25 publications
0
11
0
Order By: Relevance
“…Attestation Protocols. Finally, works such as [2,6,4,13] study the properties of attestation protocols, typically protocols that use a TPM to report on integrity evidence provided by measurement agents. They tend to focus on the cryptographic protections required to secure the evidence as it is sent over a network.…”
Section: Related Workmentioning
confidence: 99%
“…Attestation Protocols. Finally, works such as [2,6,4,13] study the properties of attestation protocols, typically protocols that use a TPM to report on integrity evidence provided by measurement agents. They tend to focus on the cryptographic protections required to secure the evidence as it is sent over a network.…”
Section: Related Workmentioning
confidence: 99%
“…Using our new version of the TAMARIN prover we have been able to also check vote privacy (modeled as an equivalence property) and furthermore eligibility (modeled as a trace property). -We also verified the Okamoto e-voting protocol [26] which relies on trapdoor commitments to achieve receipt-freeness. Voter anonymity of this protocol was previously analyzed using the AKISS tool, but we provide the first automated proof of receipt-freeness for this protocol, which was previously only shown manually [16] 1 .…”
Section: Introductionmentioning
confidence: 90%
“…The need for additional normal-form conditions will become apparent with the following example using the equational theory for trapdoor commitments, needed for instance in Okamoto's voting protocol [26]. Trapdoor commitments are commitments that can be opened to return a different value than the one initially committed, using a special trapdoor.…”
Section: Further Restrictions -Normal Form Conditionsmentioning
confidence: 99%
See 2 more Smart Citations