A model for asynchronous reactive systems and its application to secure message transmission
We present a rigorous model for secure reactive systems in asynchronous networks with a sound cryptographic semantics, supporting abstract specifications and the composition of secure systems. This enables modular proofs of security, which is essential in bridging the gap between the rigorous proof...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 200 |
---|---|
container_issue | |
container_start_page | 184 |
container_title | |
container_volume | |
creator | Pfitzmann, B. Waidner, M. |
description | We present a rigorous model for secure reactive systems in asynchronous networks with a sound cryptographic semantics, supporting abstract specifications and the composition of secure systems. This enables modular proofs of security, which is essential in bridging the gap between the rigorous proof techniques of cryptography and tool-supported formal proof techniques. The model follows the general simulatability approach of modern cryptography. A variety of network structures and trust models can be described such as static and adaptive adversaries, some examples of this are given. As an example of our specification methodology we provide an abstract and complete specification for Secure Message Transmission, improving on recent results by Lynch (1999), and verify one concrete implementation. Our proof is based on a general theorem on the security of encryption in a reactive multi-user setting, generalizing a recent result by Bellare et. al (2000). |
doi_str_mv | 10.1109/SECPRI.2001.924298 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_924298</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>924298</ieee_id><sourcerecordid>924298</sourcerecordid><originalsourceid>FETCH-LOGICAL-c153t-11ebd4718c2ff3c156254f71d15c6f5e51753ccbafe9b776466437a54ed1a0a73</originalsourceid><addsrcrecordid>eNotkMtKQzEURYMPsK3-QEf5gVtz8myGpVQtFBQfM6GkuedqpPdBTir07y3U0YK9YA8WY1MQMwDh799Wy5fX9UwKATMvtfTzCzaSypkKpHCXbCyc9QaEtv6KjUDMobIC4IaNiX6EkEJ5PWKfC972Ne5502ce6NjF79x3_YF4xhBL-kVORyrYEg9dzVM5cRj2KYaS-o6XnhPGQ0beIlH4Ql5y6KhNRCd9y66bsCe8--eEfTys3pdP1eb5cb1cbKoIRpUKAHe1djCPsmnUabPS6MZBDSbaxqABZ1SMu9Cg3zlntbVauWA01hBEcGrCpuffhIjbIac25OP2HEX9ARQpViU</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>A model for asynchronous reactive systems and its application to secure message transmission</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Pfitzmann, B. ; Waidner, M.</creator><creatorcontrib>Pfitzmann, B. ; Waidner, M.</creatorcontrib><description>We present a rigorous model for secure reactive systems in asynchronous networks with a sound cryptographic semantics, supporting abstract specifications and the composition of secure systems. This enables modular proofs of security, which is essential in bridging the gap between the rigorous proof techniques of cryptography and tool-supported formal proof techniques. The model follows the general simulatability approach of modern cryptography. A variety of network structures and trust models can be described such as static and adaptive adversaries, some examples of this are given. As an example of our specification methodology we provide an abstract and complete specification for Secure Message Transmission, improving on recent results by Lynch (1999), and verify one concrete implementation. Our proof is based on a general theorem on the security of encryption in a reactive multi-user setting, generalizing a recent result by Bellare et. al (2000).</description><identifier>ISSN: 1081-6011</identifier><identifier>ISBN: 0769510469</identifier><identifier>ISBN: 9780769510460</identifier><identifier>EISSN: 2375-1207</identifier><identifier>DOI: 10.1109/SECPRI.2001.924298</identifier><language>eng</language><publisher>IEEE</publisher><subject>Concrete ; Contracts ; Cryptographic protocols ; Cryptography ; Laboratories ; Security</subject><ispartof>Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001, 2001, p.184-200</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c153t-11ebd4718c2ff3c156254f71d15c6f5e51753ccbafe9b776466437a54ed1a0a73</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/924298$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2051,4035,4036,27904,54899</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/924298$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Pfitzmann, B.</creatorcontrib><creatorcontrib>Waidner, M.</creatorcontrib><title>A model for asynchronous reactive systems and its application to secure message transmission</title><title>Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001</title><addtitle>SECPRI</addtitle><description>We present a rigorous model for secure reactive systems in asynchronous networks with a sound cryptographic semantics, supporting abstract specifications and the composition of secure systems. This enables modular proofs of security, which is essential in bridging the gap between the rigorous proof techniques of cryptography and tool-supported formal proof techniques. The model follows the general simulatability approach of modern cryptography. A variety of network structures and trust models can be described such as static and adaptive adversaries, some examples of this are given. As an example of our specification methodology we provide an abstract and complete specification for Secure Message Transmission, improving on recent results by Lynch (1999), and verify one concrete implementation. Our proof is based on a general theorem on the security of encryption in a reactive multi-user setting, generalizing a recent result by Bellare et. al (2000).</description><subject>Concrete</subject><subject>Contracts</subject><subject>Cryptographic protocols</subject><subject>Cryptography</subject><subject>Laboratories</subject><subject>Security</subject><issn>1081-6011</issn><issn>2375-1207</issn><isbn>0769510469</isbn><isbn>9780769510460</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2001</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotkMtKQzEURYMPsK3-QEf5gVtz8myGpVQtFBQfM6GkuedqpPdBTir07y3U0YK9YA8WY1MQMwDh799Wy5fX9UwKATMvtfTzCzaSypkKpHCXbCyc9QaEtv6KjUDMobIC4IaNiX6EkEJ5PWKfC972Ne5502ce6NjF79x3_YF4xhBL-kVORyrYEg9dzVM5cRj2KYaS-o6XnhPGQ0beIlH4Ql5y6KhNRCd9y66bsCe8--eEfTys3pdP1eb5cb1cbKoIRpUKAHe1djCPsmnUabPS6MZBDSbaxqABZ1SMu9Cg3zlntbVauWA01hBEcGrCpuffhIjbIac25OP2HEX9ARQpViU</recordid><startdate>2001</startdate><enddate>2001</enddate><creator>Pfitzmann, B.</creator><creator>Waidner, M.</creator><general>IEEE</general><scope>6IE</scope><scope>6IH</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIO</scope></search><sort><creationdate>2001</creationdate><title>A model for asynchronous reactive systems and its application to secure message transmission</title><author>Pfitzmann, B. ; Waidner, M.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c153t-11ebd4718c2ff3c156254f71d15c6f5e51753ccbafe9b776466437a54ed1a0a73</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2001</creationdate><topic>Concrete</topic><topic>Contracts</topic><topic>Cryptographic protocols</topic><topic>Cryptography</topic><topic>Laboratories</topic><topic>Security</topic><toplevel>online_resources</toplevel><creatorcontrib>Pfitzmann, B.</creatorcontrib><creatorcontrib>Waidner, M.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan (POP) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP) 1998-present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Pfitzmann, B.</au><au>Waidner, M.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>A model for asynchronous reactive systems and its application to secure message transmission</atitle><btitle>Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001</btitle><stitle>SECPRI</stitle><date>2001</date><risdate>2001</risdate><spage>184</spage><epage>200</epage><pages>184-200</pages><issn>1081-6011</issn><eissn>2375-1207</eissn><isbn>0769510469</isbn><isbn>9780769510460</isbn><abstract>We present a rigorous model for secure reactive systems in asynchronous networks with a sound cryptographic semantics, supporting abstract specifications and the composition of secure systems. This enables modular proofs of security, which is essential in bridging the gap between the rigorous proof techniques of cryptography and tool-supported formal proof techniques. The model follows the general simulatability approach of modern cryptography. A variety of network structures and trust models can be described such as static and adaptive adversaries, some examples of this are given. As an example of our specification methodology we provide an abstract and complete specification for Secure Message Transmission, improving on recent results by Lynch (1999), and verify one concrete implementation. Our proof is based on a general theorem on the security of encryption in a reactive multi-user setting, generalizing a recent result by Bellare et. al (2000).</abstract><pub>IEEE</pub><doi>10.1109/SECPRI.2001.924298</doi><tpages>17</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1081-6011 |
ispartof | Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001, 2001, p.184-200 |
issn | 1081-6011 2375-1207 |
language | eng |
recordid | cdi_ieee_primary_924298 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Concrete Contracts Cryptographic protocols Cryptography Laboratories Security |
title | A model for asynchronous reactive systems and its application to secure message transmission |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-21T18%3A22%3A45IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=A%20model%20for%20asynchronous%20reactive%20systems%20and%20its%20application%20to%20secure%20message%20transmission&rft.btitle=Proceedings%202001%20IEEE%20Symposium%20on%20Security%20and%20Privacy.%20S&P%202001&rft.au=Pfitzmann,%20B.&rft.date=2001&rft.spage=184&rft.epage=200&rft.pages=184-200&rft.issn=1081-6011&rft.eissn=2375-1207&rft.isbn=0769510469&rft.isbn_list=9780769510460&rft_id=info:doi/10.1109/SECPRI.2001.924298&rft_dat=%3Cieee_6IE%3E924298%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=924298&rfr_iscdi=true |