Affiliation:
1. Lucent Technologies, Palo Alto, CA
Abstract
We develop principles and rules for achieving secrecy properties in security protocols. Our approach is based on traditional classification techniques, and extends those techniques to handle concurrent processes that use shared-key cryptography. The rules have the form of typing rules for a basic concurrent language with cryptographic primitives, the spi calculus. They guarantee that, if a protocol typechecks, then it does not leak its secret inputs.
Publisher
Association for Computing Machinery (ACM)
Subject
Artificial Intelligence,Hardware and Architecture,Information Systems,Control and Systems Engineering,Software
Reference44 articles.
1. Protection in programming-language translations
2. Lecture Notes in Computer Science;ABADI M.
3. A bisimulation method for cryptographic protocols;ABADI M.;Nord. J. Comput.,1998
Cited by
143 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Metadata Privacy Beyond Tunneling for Instant Messaging;2024 IEEE 9th European Symposium on Security and Privacy (EuroS&P);2024-07-08
2. Verifying Indistinguishability of Privacy-Preserving Protocols;Proceedings of the ACM on Programming Languages;2023-10-16
3. Robust Safety for Move;2023 IEEE 36th Computer Security Foundations Symposium (CSF);2023-07
4. Type Checking and Security;Encyclopedia of Cryptography, Security and Privacy;2023
5. Adversary Models for Mobile Device Authentication;ACM Computing Surveys;2022-12-31