Composing protocols with randomized actions

Matthew S. Bauer, Rohit Chadha, Mahesh Viswanathan

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Recently, several composition results have been established, showing that two cryptographic protocols proven secure against a Dolev-Yao attacker continue to afford the same security guarantees when composed together, provided the protocol messages are tagged with the information of which protocol they belong to. The key technical tool used to establish this guarantee is a separation result which shows that any attack on the composition can be mapped to an attack on one of the composed protocols running in isolation. We consider the composition of protocols which, in addition to using cryptographic primitives, also employ randomization within the protocol to achieve their goals. We show that if the protocols never reveal a secret with a probability greater than a given threshold, then neither does their composition, given that protocol messages are tagged with the information of which protocol they belong to.

Original languageEnglish (US)
Title of host publicationPrinciples of Security and Trust - 5th International Conference, POST 2016 Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Proceedings
EditorsLuca Viganò, Frank Piessens
PublisherSpringer
Pages189-210
Number of pages22
ISBN (Print)9783662496343
DOIs
StatePublished - 2016
Event5th International Conference on Principles of Security and Trust, POST 2016 held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016 - Eindhoven, Netherlands
Duration: Apr 2 2016Apr 8 2016

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume9635
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other5th International Conference on Principles of Security and Trust, POST 2016 held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016
Country/TerritoryNetherlands
CityEindhoven
Period4/2/164/8/16

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint

Dive into the research topics of 'Composing protocols with randomized actions'. Together they form a unique fingerprint.

Cite this