2006
DOI: 10.1007/11864219_17
|View full text |Cite
|
Sign up to set email alerts
|

Time-Bounded Task-PIOAs: A Framework for Analyzing Security Protocols

Abstract: We present the Time-Bounded Task-PIOA modeling framework, an extension of the Probabilistic I/O Automata (PIOA) framework that is intended to support modeling and verification of security protocols. Time-Bounded Task-PIOAs directly model probabilistic and nondeterministic behavior, partial-information adversarial scheduling, and time-bounded computation. Together, these features are adequate to support modeling of key aspects of security protocols, including secrecy requirements and limitations on the knowledg… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
81
0

Year Published

2008
2008
2015
2015

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 49 publications
(82 citation statements)
references
References 17 publications
1
81
0
Order By: Relevance
“…The next step of the simulation defines from state the last algorithm that S * would have sent to F atomic such that A(state,X 0 ; r A ) would produce (X, X ), using solely on the view of A since in fact X, X should be the output m of F atomic . By the assumptions we use, we now have another algorithm E(state,X 0 ; r A ) that yields x such that X = g x or R COM aborts 7 . Thus, our constructed I can simply run E(state,X 0 ; r A ) by using the view of S * .…”
Section: B Proof Of Th 10mentioning
confidence: 99%
“…The next step of the simulation defines from state the last algorithm that S * would have sent to F atomic such that A(state,X 0 ; r A ) would produce (X, X ), using solely on the view of A since in fact X, X should be the output m of F atomic . By the assumptions we use, we now have another algorithm E(state,X 0 ; r A ) that yields x such that X = g x or R COM aborts 7 . Thus, our constructed I can simply run E(state,X 0 ; r A ) by using the view of S * .…”
Section: B Proof Of Th 10mentioning
confidence: 99%
“…Such assumptions on the idealprocess adversary are relatively wide-spread, but little-researched. They appeared already in the original report introducing universal composability [19], where the ideal signature functionality F SIG assumed the adversary to return a bit-string representing the signature when asked so. The rationale of putting such restrictions on the ideal adversary are twofold.…”
Section: Ideal Librarymentioning
confidence: 99%
“…Most of the recent approaches to primitive-construction employ the universal composability (UC) framework [6] in order to specify and prove the correctness/security of their cryptographic designs. The UC framework is a formalism that allows for cryptographic protocols to be computationally analysed in a single session, yet the security guarantees thereby obtained are preserved when multiple sessions are composed concurrently, in parallel and/or sequentially.…”
Section: Introductionmentioning
confidence: 99%
“…The UC framework is a formalism that allows for cryptographic protocols to be computationally analysed in a single session, yet the security guarantees thereby obtained are preserved when multiple sessions are composed concurrently, in parallel and/or sequentially. See Appendix A, for a short wrap-up on UC frameworks [6,8] and UC proofs. In [6], Canetti shows that any polynomial-time multi-party functionality is feasible in the UC framework if the majority of participants are honest.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation