Download presentation
Presentation is loading. Please wait.
Published byHollie Norman Modified over 9 years ago
1
Bangalore, 2 Feb 2005Probabilistic security protocols 1 CIMPA School on Security Specification and verification of randomized security protocols Lecture 2 Catuscia Palamidessi, INRIA & LIX catuscia@lix.polytechnique.fr www.lix.polytechnique.fr/~catuscia Page of the course: www.lix.polytechnique.fr/~catuscia/teaching/CIMPA_School_05/
2
Bangalore, 2 Feb 2005Probabilistic security protocols 2 Plan of the course Overview of the basic notions of Probability theory and Measure theory Probabilistic automata Probabilistic -calculus Applications to the specification and verification of randomized security protocols –Anonymity –Fair exchange
3
Bangalore, 2 Feb 2005Probabilistic security protocols 3 Randomized security protocols A certain number of security protocols use randomized primitives –Anonymity: Crowds [Reiter and Rubin,1998], –anonymous communication (anonymity of the sender) Onion Routing [Syverson, Goldschlag and Reed, 1997] –anonymous communication Freenet [Clarke et al. 2001] –anonymous information storage and retrieval –Fairness Probabilistic Contract Signing protocol [Ben-Or et al., 1990] Probabilistic non-repudiation protocol [Markowitch and Roggeman, 1999] Partial Secrets Exchange protocol [Even, Goldreich and Lempel, 1985]
4
Bangalore, 2 Feb 2005Probabilistic security protocols 4 The probabilistic -calculus References: O.M. Herescu, C. Palamidessi. Probabilistic asynchronous - calculus. In J. Tiuryn, ed., Proc. of FOSSACS 2000 (Part of ETAPS 2000), vol. 1784 of LNCS, pages 146--160. Springer- Verlag, 2000. www.lix.polytechnique.fr/~catuscia/ papers/Prob_asy_pi/report.ps www.lix.polytechnique.fr/~catuscia/ papers/Prob_asy_pi/report.ps C. Palamidessi, O.M. Herescu. A Randomized Distributed Encoding of the -Calculus with Mixed Choice. To appear in Theoretical Computer Science (short version in Proc. of IFIP- TCS 2002, pages 537-549, Kluwer, 2002.) www.lix.polytechnique.fr/~catuscia/ papers/prob_enc/report.ps
5
Bangalore, 2 Feb 2005Probabilistic security protocols 5 The probabilistic -calculus Originally developed as an intermediate language for the fully distributed implementation of the -calculus –The mixed choice mechanism of the p-calculus cannot be implemented in a fully distributed way deterministically, but can be done in a randomized way. Correctness is achieved with probability 1. Presently, we use it as a framework to model the correctness of security protocols: –to specify security properties which require a probabilistic formulation, –to represent randomized security protocols –to prove their correctness, i.e. t verify that they satisfy the intended properties
6
Bangalore, 2 Feb 2005Probabilistic security protocols 6 The probabilistic -calculus: syntax Similar to the asynchronous p-calculus of Amadio,Castellani and Sangiorgi, the only difference is that the input-guarded choice is probabilistic input | silent actioninaction probabilistic choice output parallel new name replication
7
Bangalore, 2 Feb 2005Probabilistic security protocols 7 The probabilistic -calculus: operational sem Based on the probabilistic automata of Segala and Lynch nondeterministic and probabilistic behavior nondeterminism associated to a scheduler (adversary) probabilistic behavior associated to the choice of the process –groups, probabilistic distributions, steps 1/2 1/3 2/3 1/2 1/3 2/3 1/2 1/3 2/3 steps
8
Bangalore, 2 Feb 2005Probabilistic security protocols 8 The probabilistic -calculus: operational sem … 11 22 nn p1p1 p2p2 pnpn
9
Bangalore, 2 Feb 2005Probabilistic security protocols 9 The probabilistic -calculus: operational sem
10
Bangalore, 2 Feb 2005Probabilistic security protocols 10 The probabilistic -calculus: operational sem
11
Bangalore, 2 Feb 2005Probabilistic security protocols 11 The probabilistic -calculus: operational sem
12
Bangalore, 2 Feb 2005Probabilistic security protocols 12 The probabilistic -calculus: operational sem
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.