Dynamic types for authentication

  • Authors:
  • Michele Bugliesi;Riccardo Focardi;Matteo Maffei

  • Affiliations:
  • -;-;Dipartimento di Informatica, Università Ca' Foscari di Venezia, Via Torino 155, I-30172 Mestre (Ve), Italy. E-mail: {michele,focardi,maffei}@dsi.unive.it

  • Venue:
  • Journal of Computer Security - Formal Methods in Security Engineering Workshop (FMSE 04)
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

We propose a type and effect system for authentication protocols built upon a tagging scheme that formalizes the intended semantics of ciphertexts. The main result is that the validation of each component in isolation is provably sound and fully compositional: if all the protocol participants are independently validated, then the protocol as a whole guarantees authentication in the presence of Dolev-Yao intruders possibly sharing long term keys with honest principals. Protocols are thus validated in the presence of both malicious outsiders and compromised insiders. The highly compositional nature of the analysis makes it suitable for multi-protocol systems, where different protocols might be executed concurrently.