Analyzing Security Protocols Using Time-Bounded Task-PIOAs

  • Authors:
  • Ran Canetti;Ling Cheung;Dilsun Kaynar;Moses Liskov;Nancy Lynch;Olivier Pereira;Roberto Segala

  • Affiliations:
  • IBM T.J. Watson Center, Hawthorne, USA and Massachusetts Institute of Technology, Cambridge, USA;Massachusetts Institute of Technology, Cambridge, USA;Carnegie Mellon University, Pittsburgh, USA;The College of William and Mary, Williamsburg, USA;Massachusetts Institute of Technology, Cambridge, USA;Université catholique de Louvain, Louvain-la-Neuve, Belgium;Università di Verona, Verona, Italy

  • Venue:
  • Discrete Event Dynamic Systems
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

This paper presents the time-bounded task-PIOA modeling framework, an extension of the probabilistic input/output automata (PIOA) framework that can be used for modeling and verifying security protocols. Time-bounded task-PIOAs can describe probabilistic and nondeterministic behavior, as well as time-bounded computation. Together, these features support modeling of important aspects of security protocols, including secrecy requirements and limitations on the computational power of adversarial parties. They also support security protocol verification using methods that are compatible with less formal approaches used in the computational cryptography research community. We illustrate the use of our framework by outlining a proof of functional correctness and security properties for a well-known oblivious transfer protocol.