A model for asynchronous reactive systems and its application to secure message transmission

We present a rigorous model for secure reactive systems in asynchronous networks with a sound cryptographic semantics, supporting abstract specifications and the composition of secure systems. This enables modular proofs of security, which is essential in bridging the gap between the rigorous proof...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Pfitzmann, B., Waidner, M.
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 200
container_issue
container_start_page 184
container_title
container_volume
creator Pfitzmann, B.
Waidner, M.
description We present a rigorous model for secure reactive systems in asynchronous networks with a sound cryptographic semantics, supporting abstract specifications and the composition of secure systems. This enables modular proofs of security, which is essential in bridging the gap between the rigorous proof techniques of cryptography and tool-supported formal proof techniques. The model follows the general simulatability approach of modern cryptography. A variety of network structures and trust models can be described such as static and adaptive adversaries, some examples of this are given. As an example of our specification methodology we provide an abstract and complete specification for Secure Message Transmission, improving on recent results by Lynch (1999), and verify one concrete implementation. Our proof is based on a general theorem on the security of encryption in a reactive multi-user setting, generalizing a recent result by Bellare et. al (2000).
doi_str_mv 10.1109/SECPRI.2001.924298
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_924298</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>924298</ieee_id><sourcerecordid>924298</sourcerecordid><originalsourceid>FETCH-LOGICAL-c153t-11ebd4718c2ff3c156254f71d15c6f5e51753ccbafe9b776466437a54ed1a0a73</originalsourceid><addsrcrecordid>eNotkMtKQzEURYMPsK3-QEf5gVtz8myGpVQtFBQfM6GkuedqpPdBTir07y3U0YK9YA8WY1MQMwDh799Wy5fX9UwKATMvtfTzCzaSypkKpHCXbCyc9QaEtv6KjUDMobIC4IaNiX6EkEJ5PWKfC972Ne5502ce6NjF79x3_YF4xhBL-kVORyrYEg9dzVM5cRj2KYaS-o6XnhPGQ0beIlH4Ql5y6KhNRCd9y66bsCe8--eEfTys3pdP1eb5cb1cbKoIRpUKAHe1djCPsmnUabPS6MZBDSbaxqABZ1SMu9Cg3zlntbVauWA01hBEcGrCpuffhIjbIac25OP2HEX9ARQpViU</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>A model for asynchronous reactive systems and its application to secure message transmission</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Pfitzmann, B. ; Waidner, M.</creator><creatorcontrib>Pfitzmann, B. ; Waidner, M.</creatorcontrib><description>We present a rigorous model for secure reactive systems in asynchronous networks with a sound cryptographic semantics, supporting abstract specifications and the composition of secure systems. This enables modular proofs of security, which is essential in bridging the gap between the rigorous proof techniques of cryptography and tool-supported formal proof techniques. The model follows the general simulatability approach of modern cryptography. A variety of network structures and trust models can be described such as static and adaptive adversaries, some examples of this are given. As an example of our specification methodology we provide an abstract and complete specification for Secure Message Transmission, improving on recent results by Lynch (1999), and verify one concrete implementation. Our proof is based on a general theorem on the security of encryption in a reactive multi-user setting, generalizing a recent result by Bellare et. al (2000).</description><identifier>ISSN: 1081-6011</identifier><identifier>ISBN: 0769510469</identifier><identifier>ISBN: 9780769510460</identifier><identifier>EISSN: 2375-1207</identifier><identifier>DOI: 10.1109/SECPRI.2001.924298</identifier><language>eng</language><publisher>IEEE</publisher><subject>Concrete ; Contracts ; Cryptographic protocols ; Cryptography ; Laboratories ; Security</subject><ispartof>Proceedings 2001 IEEE Symposium on Security and Privacy. S&amp;P 2001, 2001, p.184-200</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c153t-11ebd4718c2ff3c156254f71d15c6f5e51753ccbafe9b776466437a54ed1a0a73</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/924298$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2051,4035,4036,27904,54899</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/924298$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Pfitzmann, B.</creatorcontrib><creatorcontrib>Waidner, M.</creatorcontrib><title>A model for asynchronous reactive systems and its application to secure message transmission</title><title>Proceedings 2001 IEEE Symposium on Security and Privacy. S&amp;P 2001</title><addtitle>SECPRI</addtitle><description>We present a rigorous model for secure reactive systems in asynchronous networks with a sound cryptographic semantics, supporting abstract specifications and the composition of secure systems. This enables modular proofs of security, which is essential in bridging the gap between the rigorous proof techniques of cryptography and tool-supported formal proof techniques. The model follows the general simulatability approach of modern cryptography. A variety of network structures and trust models can be described such as static and adaptive adversaries, some examples of this are given. As an example of our specification methodology we provide an abstract and complete specification for Secure Message Transmission, improving on recent results by Lynch (1999), and verify one concrete implementation. Our proof is based on a general theorem on the security of encryption in a reactive multi-user setting, generalizing a recent result by Bellare et. al (2000).</description><subject>Concrete</subject><subject>Contracts</subject><subject>Cryptographic protocols</subject><subject>Cryptography</subject><subject>Laboratories</subject><subject>Security</subject><issn>1081-6011</issn><issn>2375-1207</issn><isbn>0769510469</isbn><isbn>9780769510460</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2001</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotkMtKQzEURYMPsK3-QEf5gVtz8myGpVQtFBQfM6GkuedqpPdBTir07y3U0YK9YA8WY1MQMwDh799Wy5fX9UwKATMvtfTzCzaSypkKpHCXbCyc9QaEtv6KjUDMobIC4IaNiX6EkEJ5PWKfC972Ne5502ce6NjF79x3_YF4xhBL-kVORyrYEg9dzVM5cRj2KYaS-o6XnhPGQ0beIlH4Ql5y6KhNRCd9y66bsCe8--eEfTys3pdP1eb5cb1cbKoIRpUKAHe1djCPsmnUabPS6MZBDSbaxqABZ1SMu9Cg3zlntbVauWA01hBEcGrCpuffhIjbIac25OP2HEX9ARQpViU</recordid><startdate>2001</startdate><enddate>2001</enddate><creator>Pfitzmann, B.</creator><creator>Waidner, M.</creator><general>IEEE</general><scope>6IE</scope><scope>6IH</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIO</scope></search><sort><creationdate>2001</creationdate><title>A model for asynchronous reactive systems and its application to secure message transmission</title><author>Pfitzmann, B. ; Waidner, M.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c153t-11ebd4718c2ff3c156254f71d15c6f5e51753ccbafe9b776466437a54ed1a0a73</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2001</creationdate><topic>Concrete</topic><topic>Contracts</topic><topic>Cryptographic protocols</topic><topic>Cryptography</topic><topic>Laboratories</topic><topic>Security</topic><toplevel>online_resources</toplevel><creatorcontrib>Pfitzmann, B.</creatorcontrib><creatorcontrib>Waidner, M.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan (POP) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP) 1998-present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Pfitzmann, B.</au><au>Waidner, M.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>A model for asynchronous reactive systems and its application to secure message transmission</atitle><btitle>Proceedings 2001 IEEE Symposium on Security and Privacy. S&amp;P 2001</btitle><stitle>SECPRI</stitle><date>2001</date><risdate>2001</risdate><spage>184</spage><epage>200</epage><pages>184-200</pages><issn>1081-6011</issn><eissn>2375-1207</eissn><isbn>0769510469</isbn><isbn>9780769510460</isbn><abstract>We present a rigorous model for secure reactive systems in asynchronous networks with a sound cryptographic semantics, supporting abstract specifications and the composition of secure systems. This enables modular proofs of security, which is essential in bridging the gap between the rigorous proof techniques of cryptography and tool-supported formal proof techniques. The model follows the general simulatability approach of modern cryptography. A variety of network structures and trust models can be described such as static and adaptive adversaries, some examples of this are given. As an example of our specification methodology we provide an abstract and complete specification for Secure Message Transmission, improving on recent results by Lynch (1999), and verify one concrete implementation. Our proof is based on a general theorem on the security of encryption in a reactive multi-user setting, generalizing a recent result by Bellare et. al (2000).</abstract><pub>IEEE</pub><doi>10.1109/SECPRI.2001.924298</doi><tpages>17</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1081-6011
ispartof Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001, 2001, p.184-200
issn 1081-6011
2375-1207
language eng
recordid cdi_ieee_primary_924298
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Concrete
Contracts
Cryptographic protocols
Cryptography
Laboratories
Security
title A model for asynchronous reactive systems and its application to secure message transmission
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-21T18%3A22%3A45IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=A%20model%20for%20asynchronous%20reactive%20systems%20and%20its%20application%20to%20secure%20message%20transmission&rft.btitle=Proceedings%202001%20IEEE%20Symposium%20on%20Security%20and%20Privacy.%20S&P%202001&rft.au=Pfitzmann,%20B.&rft.date=2001&rft.spage=184&rft.epage=200&rft.pages=184-200&rft.issn=1081-6011&rft.eissn=2375-1207&rft.isbn=0769510469&rft.isbn_list=9780769510460&rft_id=info:doi/10.1109/SECPRI.2001.924298&rft_dat=%3Cieee_6IE%3E924298%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=924298&rfr_iscdi=true