Compositional Analysis of Contract Signing Protocols

  • Authors:
  • Michael Backes;Anupam Datta;Ante Derek;John C. Mitchell;Mathieu Turuani

  • Affiliations:
  • IBM Zürich Research Lab;Stanford University;Stanford University;Stanford University;LORIA-INRIA Nancy

  • Venue:
  • CSFW '05 Proceedings of the 18th IEEE workshop on Computer Security Foundations
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

We develop a general method for reasoning about contract-signing protocols using a specialized protocol logic. The method is applied to prove properties of the Asokan-Shoup-Waidner and theGaray-Jacobson-MacKenzie protocols. Our method offers certain advantages over previous analysis techniques. First, it is compositional: the security guarantees are proved by combining the independent proofs for the three sub-protocols of which each protocol is comprised. Second, the formal proofs are carried out in a "template" form, which gives us a reusable proof that may be instantiated for the ASW and GJM protocols, as well as for other protocols with the same arrangement of messages. Third, the proofs follow the design intuition. In particular, in proving game-theoretic properties like fairness, we demonstrate that the specific strategy that the protocol designer had in mind works, instead of showing that one exists. Finally, our results hold even when an unbounded number of sessions are executed in parallel.