期刊文献+

关于秘密共享方案在应用Pi演算中的实现 被引量:2

Automatic verification technique for secret-sharing schemes in applied Pi-calculus
下载PDF
导出
摘要 针对秘密共享方案的自动化验证问题,提出一种基于等值理论的秘密共享方案自动化验证方法。首先通过等值理论在应用Pi演算中对可验证的多秘密共享方案的密码学语义进行了形式化定义。在此基础上,进一步提出了一种用于将所提出等值理论转化为自动化协议验证器ProVerif中重写机制的编码方法,在ProVerif中实现了关于可验证的多秘密共享方案的自动化验证。通过证明给出了关于可验证的多秘密共享方案形式化分析结果的健壮性结论:如果自动化协议验证器ProVerif中可验证的多秘密共享方案的形式化分析结果满足特定安全属性,则其能够归约证明应用Pi演算模型中针对可验证的多秘密共享方案所建立的现实敌手可以"模拟"ProVerif验证器中的理想敌手,其意味着现实敌手与理想敌手是不可区分的。 In this paper, an abstraction of secret-sharing schemes that is accessible to a fully mechanized analysis was given. This abstraction was formalized within the applied Pi-calculus by using an equational theory that characterized the cryptographic semantics of secret share. Based on that, an encoding method from the equational theory into a convergent rewriting system was presented, which was suitable for the automated protocol verifier ProVerif. Finally, the first general soundness result for verifiable multi-secret sharing schemes was concluded: for the multi-secret sharing schemes satisfying the specified security criterion in ProVerif, the realistic adversaries modeled on multi-secret sharing schemes in Pi-calculus can simulate the ideal adversaries in verifier ProVerif, which means that realistic adversaries and ideal adversaries are indistinguishable.
作者 徐军
出处 《计算机应用》 CSCD 北大核心 2013年第11期3247-3251,共5页 journal of Computer Applications
关键词 PI演算 秘密共享 形式化分析 协议验证 Pi-calculus secret sharing formal analysis protocol verification
  • 相关文献

参考文献14

  • 1HE A J, DAWSON E. Multistage secret sharing based on one-wayfunction [ J]. Electronics Letters, 1994, 30(9): 1591 -1592,.
  • 2YANG C-C, CHANG T-Y, HWANG M-S. A (t, n) multi-secret sharing scheme [ J]. Applied Mathematics and Computation, 2004, 151(2) : 483 -490.
  • 3SHAO J, CAO Z F. A new efficient (t, n) verifiable multi-secret sharing (VMSS) based on YCH scheme [ J]. Applied Mathematics and Computation, 2005, 168(1) : 135 - 140.
  • 4ZHAO J, ZI-IANG J, ZHAO R. A practical verifiable multi-secret sharing scheme [ J]. Computer Standards and Interfaces, 2007, 29 (1): 138-141.
  • 5YEW K M, RAHMAN M Z, LEE S P. Formal verification of secret sharing protocol using Coq [ C] // Proceedings of the 5th Asian Com- puting Science Conference on Advances in Computing Science. Ber- lin: Springer-Verlag, 1999:381-382.
  • 6ABADI M, FOURNET C. Mobile values, new names, and secure com- munication[ C]/! Proceedings of the 28th Symposium on Principles of Programming Languages. New York: ACM Press, 2001:104 -115.
  • 7ABADI M. Secrecy by typing in security protocols [ J]. Journal of the ACM, 1999, 46(5) : 749 -786.
  • 8ABADI M, BLANCHET B, FOURNET C. Just fast keying in the Pi calculus [ J]. ACM Transactions on Information and System Securi- ty, 2007, 10(3): 9.
  • 9ABADI M, GORDON A D. A calculus for cryptographic protocols: the Spi calculus [ J]. Information and Computation, 1999, 148(1) : 1 -70.
  • 10BACKES M, MAFFEI M, UNRUH D. Zero-knowledge in the ap- plied Pi-calculus and automated verification of the direct anonymous attestation protocol [ C]// Proceedings of the 29th IEEE Symposi- um on Security and Privacy. Washington, DC: IEEE Computer So- ciety, 2008:202-215.

同被引文献13

  • 1刘学锋,石昊苏,薛锐,周径野.安全协议自动验证工具的状态空间剪枝[J].计算机应用,2004,24(8):117-121. 被引量:1
  • 2石昊苏,薛锐,冯登国.AVSP算法[J].计算机工程与设计,2005,26(4):867-869. 被引量:4
  • 3赵宇,王亚弟,韩继红.基于Spi演算的SSL3.0协议安全性分析[J].计算机应用,2005,25(11):2515-2520. 被引量:7
  • 4Kusters R, Trudrung T. Reducing protocol analysis with XOR to the X()R-free case in the Horn theory based approach[C]// Proceedings of the 15th ACM conference on Computer and Communications Security (CCS'08), Alexandria, VA, USA: Hilton Alexandria Mark Center. 2008: 129-138.
  • 5Kusters R, Trudrung T. Using ProVerif to analyze protocols with Diffie-Hellman exponentiation [C]// 22nd IEEE Computer Security Foundations Symposium (CSF'09), New-York, USA: IEEE Computer Socie-ty, 2009: 157-171.
  • 6Blancher B, Abadi M, Fournet C. Autonlated verification of ~lected equivalences for ~urity protocols[J]. Journal of I.ogic and Algebraic Programming, 2008, 75(1): 3-51.
  • 7WAP Forunl Wtrele4s Application Protocol Wireless Trar~s port Layer Security Specification Version 06[H3/()L]. (2006- 02-02)[2014-12-20]. http: //www. wapfortm~org.
  • 8Blancher 13. An Efficient Cryptographic Protocol Veri- fier Based on Prolog RulesEC-~//Proceeding of the 14th IEEE Computer Security Foundations Workshop (CS- FW-14), Cape Breton, Nova Scotia, Canada.. IEEE Computer Society, 2001:82-96.
  • 9Blanchet B, Smyth B, Cheval V. ProVerif 1. 88: Automatic Cryptographic Protocol Verifier User Manual and Tutorial, EEB/OL~. (2013-08-30) E2014-12-01~. http.. //pm,secc~ gforg~ inrb. fr/personal/bblanche/proverif/.
  • 10ABADI M,TUTTLE M R.A Semantics for a Logic of Authentication[C]//PODC’91 Proceedings of the Tenth Annual ACM Symposium on Principles of Distributed Computing.New York:ACM,1991:201-216.DOI:10.1145/112600.112618.

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部