Inductive analysis of security protocols in Isabelle/HOL with applications to electronic voting

作者: Denis Frédéric Butin

DOI:

关键词:

摘要: Security protocols are predefined sequences of message exchanges. Their uses over computer networks aim to provide certain guarantees protocol participants. The sensitive nature many applications resting on encourages the use formal methods rigorous correctness proofs. This dissertation presents extensions Inductive Method for verification in Isabelle/HOL interactive theorem prover. current state and other analysis techniques reviewed. Protocol composition modelling is introduced put practice by holistically verifying a certification with an authentication protocol. Unlike some existing approaches, we not constrained independence requirements or search space limitations. A special kind identity-based signatures, auditable ones, specified integrated recent ISO/IEC 9798-3 side-by-side features both version signatures plain ones. largest part thesis electronic voting protocols. Innovative specification strategies described. crucial property voter privacy, being impossibility knowing how specific voted, modelled as unlinkability between pieces information. Unlinkability then using novel operators. An Fujioka, Okamoto Ohta Method. Its classic confidentiality properties verified, followed privacy. approach shown be generic enough re-usable while maintaining coherent line reasoning. We compare our work widespread process equivalence model examine respective strengths.

参考文章(95)
Denis Frédéric Butin, Giampaolo Bella, Verifying Privacy by Little Interaction and No Process Equivalence international conference on security and cryptography. pp. 251- 256 ,(2012)
Christophe De Cannière, Christian Rechberger, Finding SHA-1 characteristics: general results and applications international conference on the theory and application of cryptology and information security. pp. 1- 20 ,(2006) , 10.1007/11935230_1
Steve Kremer, Mark Ryan, Analysis of an Electronic Voting Protocol in the Applied Pi Calculus Programming Languages and Systems. pp. 186- 200 ,(2005) , 10.1007/978-3-540-31987-0_14
Atsushi Fujioka, Tatsuaki Okamoto, Kazuo Ohta, A Practical Secret Voting Scheme for Large Scale Elections theory and application of cryptographic techniques. pp. 244- 251 ,(1992) , 10.1007/3-540-57220-1_66
Giampaolo Bella, Lizzie Coles-Kemp, Layered Analysis of Security Ceremonies information security conference. pp. 273- 286 ,(2012) , 10.1007/978-3-642-30436-1_23
Somitra Kumar Sanadhya, Palash Sarkar, Deterministic Constructions of 21-Step Collisions for the SHA-2 Hash Family international conference on information security. pp. 244- 259 ,(2008) , 10.1007/978-3-540-85886-7_17
Catherine A. Meadows, Catherine A. Meadows, Formal Verification of Cryptographic Protocols: A Survey international cryptology conference. pp. 135- 150 ,(1994) , 10.1007/BFB0000430
Peter W. Shor, Polynominal time algorithms for discrete logarithms and factoring on a quantum computer algorithmic number theory symposium. pp. 289- 289 ,(1994) , 10.1007/3-540-58691-1_68
Christoph Weidenbach, Dilyana Dimova, Arnaud Fietzke, Rohit Kumar, Martin Suda, Patrick Wischnewski, SPASS Version 3.5 conference on automated deduction. pp. 140- 145 ,(2009) , 10.1007/978-3-642-02959-2_10