【24h】

Verification of Security Protocols

机译:验证安全协议

获取原文
获取原文并翻译 | 示例

摘要

Symbolic approaches have proved their usefulness for analyzing security protocols. Automatic tools have been often used for discovering previously unknown flaws. Abstracting messages by terms seems to be a good level of abstraction since it is possible to show that security proof in symbolic models actually implies stronger guarantees in computational models under classical assumptions under the implementation of the primitives.rnThere are still several open directions of research. Symbolic approaches currently allow to check classical security properties such as confidentiality and authentication. For more recent protocols such as e-voting protocols and contract-signing protocols, the properties that should be achieved are more involved and cannot be encoded in existing tools. In addition, these recent protocols make use of less classical primitives such as re-randomizable encryption scheme or blind signatures. New decision techniques have to be developed for these particular primitives and security properties.rnBridging the gap between symbolic and computation models is a promising line a research since it enables to prove strong security guarantees, benefiting from the simplicity of symbolic models. However, current results require strong assumptions on the security of the cryptographic primitives (e.g. IND-CCA2 encryption schemes). Weaker security assumptions like IND-CPA secure encryption schemes may not suffice to ensure security of protocols. Using weaker encryption schemes may thus require to adapt both symbolic models and protocols accordingly.
机译:象征性方法已证明其对分析安全协议的有用性。经常使用自动工具来发现以前未知的缺陷。用术语抽象消息似乎是一个很好的抽象层次,因为有可能表明符号模型中的安全证明实际上意味着在原始实现下的经典假设下,计算模型中的安全性得到了更强的保证。rn仍然有一些开放的研究方向。当前,符号方法允许检查经典的安全属性,例如机密性和身份验证。对于更新的协议,例如电子投票协议和合同签署协议,应实现的属性更多,并且无法在现有工具中进行编码。另外,这些最新协议使用了不太经典的原语,例如可重新随机分配的加密方案或盲签名。必须针对这些特定的原语和安全属性开发新的决策技术。弥合符号模型与计算模型之间的差距是一项有前途的研究,因为它得益于符号模型的简单性,可以证明强大的安全保证。但是,当前的结果需要对密码原语的安全性(例如IND-CCA2加密方案)进行强有力的假设。诸如IND-CPA安全加密方案之类的较弱的安全性假设可能不足以确保协议的安全性。因此,使用较弱的加密方案可能需要相应地适应符号模型和协议。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号