Private authentication

被引:62
作者
Abadi, M
Fournet, C
机构
[1] Microsoft Res, Cambridge CB3 0FB, England
[2] Univ Calif Santa Cruz, Santa Cruz, CA 95064 USA
关键词
D O I
10.1016/j.tcs.2003.12.023
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Frequently, communication between two principals reveals their identities and presence to third parties. These privacy breaches can occur even if security protocols are in use; indeed, they may even be caused by security protocols. However, with some care, security protocols can provide authentication for principals that wish to communicate while protecting them from monitoring by third parties. We discuss the problem of private authentication and present two protocols for private authentication of mobile principals. Our protocols allow two mobile principals to communicate when they meet at a location if they wish to do so, without the danger of tracking by third parties. We also present the analysis of one of the protocols in the applied pi calculus. We establish authenticity and secrecy properties. Although such properties are fairly standard, their formulation in the applied pi calculus makes an original use of process equivalences. In addition, we treat identity-protection proper-ties, thus exploring a formal model of privacy. (C) 2003 Elsevier B.V. All rights reserved.
引用
收藏
页码:427 / 476
页数:50
相关论文
共 40 条
[1]   Secure implementation of channel abstractions [J].
Abadi, M ;
Fournet, C ;
Gonthier, G .
INFORMATION AND COMPUTATION, 2002, 174 (01) :37-83
[2]  
Abadi M, 2003, LECT NOTES COMPUT SC, V2482, P27
[3]   Prudent engineering practice for cryptographic protocols [J].
Abadi, M ;
Needham, R .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1996, 22 (01) :6-15
[4]   A calculus for cryptographic protocols: The spi calculus [J].
Abadi, M ;
Gordon, AD .
INFORMATION AND COMPUTATION, 1999, 148 (01) :1-70
[5]  
ABADI M, 2001, P 28 ACM S PRINC PRO, P104, DOI DOI 10.1145/373243.360213
[6]  
Abadi M., 2000, LECT NOTES COMPUTER, V1872, P3
[7]  
ABADI M, 2000, P 27 ACM S PRINC PRO, P302
[8]  
AIELLO W, 2002, P 9 ACM C COMP COMM, P48
[9]  
[Anonymous], 1999, SPECIFICATION BLUETO
[10]  
[Anonymous], P 1 ANN INT C MOB CO