Presentation is loading. Please wait.

Presentation is loading. Please wait.

Bangalore, 2 Feb 2005Probabilistic security protocols 1 CIMPA School on Security Specification and verification of randomized security protocols Lecture.

Similar presentations


Presentation on theme: "Bangalore, 2 Feb 2005Probabilistic security protocols 1 CIMPA School on Security Specification and verification of randomized security protocols Lecture."— Presentation transcript:

1 Bangalore, 2 Feb 2005Probabilistic security protocols 1 CIMPA School on Security Specification and verification of randomized security protocols Lecture 2 Catuscia Palamidessi, INRIA & LIX catuscia@lix.polytechnique.fr www.lix.polytechnique.fr/~catuscia Page of the course: www.lix.polytechnique.fr/~catuscia/teaching/CIMPA_School_05/

2 Bangalore, 2 Feb 2005Probabilistic security protocols 2 Plan of the course Overview of the basic notions of Probability theory and Measure theory Probabilistic automata Probabilistic  -calculus Applications to the specification and verification of randomized security protocols –Anonymity –Fair exchange

3 Bangalore, 2 Feb 2005Probabilistic security protocols 3 Randomized security protocols A certain number of security protocols use randomized primitives –Anonymity: Crowds [Reiter and Rubin,1998], –anonymous communication (anonymity of the sender) Onion Routing [Syverson, Goldschlag and Reed, 1997] –anonymous communication Freenet [Clarke et al. 2001] –anonymous information storage and retrieval –Fairness Probabilistic Contract Signing protocol [Ben-Or et al., 1990] Probabilistic non-repudiation protocol [Markowitch and Roggeman, 1999] Partial Secrets Exchange protocol [Even, Goldreich and Lempel, 1985]

4 Bangalore, 2 Feb 2005Probabilistic security protocols 4 The probabilistic  -calculus References: O.M. Herescu, C. Palamidessi. Probabilistic asynchronous  - calculus. In J. Tiuryn, ed., Proc. of FOSSACS 2000 (Part of ETAPS 2000), vol. 1784 of LNCS, pages 146--160. Springer- Verlag, 2000. www.lix.polytechnique.fr/~catuscia/ papers/Prob_asy_pi/report.ps www.lix.polytechnique.fr/~catuscia/ papers/Prob_asy_pi/report.ps C. Palamidessi, O.M. Herescu. A Randomized Distributed Encoding of the  -Calculus with Mixed Choice. To appear in Theoretical Computer Science (short version in Proc. of IFIP- TCS 2002, pages 537-549, Kluwer, 2002.) www.lix.polytechnique.fr/~catuscia/ papers/prob_enc/report.ps

5 Bangalore, 2 Feb 2005Probabilistic security protocols 5 The probabilistic  -calculus Originally developed as an intermediate language for the fully distributed implementation of the  -calculus –The mixed choice mechanism of the p-calculus cannot be implemented in a fully distributed way deterministically, but can be done in a randomized way. Correctness is achieved with probability 1. Presently, we use it as a framework to model the correctness of security protocols: –to specify security properties which require a probabilistic formulation, –to represent randomized security protocols –to prove their correctness, i.e. t verify that they satisfy the intended properties

6 Bangalore, 2 Feb 2005Probabilistic security protocols 6 The probabilistic  -calculus: syntax Similar to the asynchronous p-calculus of Amadio,Castellani and Sangiorgi, the only difference is that the input-guarded choice is probabilistic input | silent actioninaction probabilistic choice output parallel new name replication

7 Bangalore, 2 Feb 2005Probabilistic security protocols 7 The probabilistic  -calculus: operational sem Based on the probabilistic automata of Segala and Lynch nondeterministic and probabilistic behavior nondeterminism associated to a scheduler (adversary) probabilistic behavior associated to the choice of the process –groups, probabilistic distributions, steps 1/2 1/3 2/3 1/2 1/3 2/3 1/2 1/3 2/3 steps

8 Bangalore, 2 Feb 2005Probabilistic security protocols 8 The probabilistic  -calculus: operational sem … 11 22 nn p1p1 p2p2 pnpn

9 Bangalore, 2 Feb 2005Probabilistic security protocols 9 The probabilistic  -calculus: operational sem

10 Bangalore, 2 Feb 2005Probabilistic security protocols 10 The probabilistic  -calculus: operational sem

11 Bangalore, 2 Feb 2005Probabilistic security protocols 11 The probabilistic  -calculus: operational sem

12 Bangalore, 2 Feb 2005Probabilistic security protocols 12 The probabilistic  -calculus: operational sem


Download ppt "Bangalore, 2 Feb 2005Probabilistic security protocols 1 CIMPA School on Security Specification and verification of randomized security protocols Lecture."

Similar presentations


Ads by Google