Types and effects for asymmetric cryptographic protocols

被引:26
作者
Gordon, AD [1 ]
Jeffrey, A [1 ]
机构
[1] Microsoft Res, Cambridge, England
来源
15TH IEEE COMPUTER SECURITY FOUNDATION WORKSHOP, PROCEEDINGS | 2002年
关键词
D O I
10.1109/CSFW.2002.1021808
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present the first type and effect system for proving authenticity properties of security protocols based on asymmetric cryptography. The most significant new features of our type system are: (1) a separation of public types (for data possibly sent to the opponent) from tainted types (for data possibly received from the opponent) via a subtype relation; (2) trust effects, to guarantee that tainted data does not, in fact, originate from the opponent; and (3) challenge/response types to support a variety of idioms used to guarantee message freshness. We illustrate the applicability of our system via protocol examples.
引用
收藏
页码:77 / 91
页数:15
相关论文
共 31 条
[1]   A calculus for cryptographic protocols: The spi calculus [J].
Abadi, M ;
Gordon, AD .
INFORMATION AND COMPUTATION, 1999, 148 (01) :1-70
[2]   Secrecy by typing in security protocols [J].
Abadi, M .
JOURNAL OF THE ACM, 1999, 46 (05) :749-786
[3]  
ABADI M, 2002, 29 ACM S PRINC PROGR, P33
[4]  
ABADI M, 2001, LECT NOTES COMPUTER, V2030, P25
[5]  
[Anonymous], 1996, LNCS
[6]   Subtyping dependent types [J].
Aspinall, D ;
Compagnoni, A .
THEORETICAL COMPUTER SCIENCE, 2001, 266 (1-2) :273-309
[7]  
Bolignano D., 1996, 3rd ACM Conference on Computer and Communications Security, P106, DOI 10.1145/238168.238196
[8]   Logic of authentication [J].
Burrows, Michael ;
Abadi, Martin ;
Needham, Roger .
Operating Systems Review (ACM), 1989, 23 (05) :1-13
[9]   LINDA IN CONTEXT [J].
CARRIERO, N ;
GELERNTER, D .
COMMUNICATIONS OF THE ACM, 1989, 32 (04) :444-458
[10]  
Cervesato I, 2001, LECT NOTES COMPUT SC, V2052, P159