Authenticity by tagging and typing

  • Authors:
  • Michele Bugliesi;Riccardo Focardi;Matteo Maffei

  • Affiliations:
  • Università Ca'Foscari di Venezia, Mestre, Italy;Università Ca'Foscari di Venezia, Mestre, Italy;Università Ca'Foscari di Venezia, Mestre, Italy

  • Venue:
  • Proceedings of the 2004 ACM workshop on Formal methods in security engineering
  • Year:
  • 2004

Quantified Score

Hi-index 0.00

Visualization

Abstract

We propose a type and effect system for authentication protocols built upon a tagging scheme that formalizes the intended semantics of ciphertexts. The main result is that the validation of each component in isolation is provably sound and fully compositional: if all the protocol participants are independently validated, then the protocol as a whole guarantees authentication in the presence of Dolev-Yao intruders. The highly compositional nature of the analysis makes it suitable for multi-protocol systems, where different protocols might be executed concurrently.