Static analysis for blinding

  • Authors:
  • Christoffer Rosenkilde Nielsen;Hanne Riis Nielson

  • Affiliations:
  • Informatics and Mathematical Modelling, Technical University of Denmark and Richard Petersens Plads, Kongens Lyngby, Denmark;Informatics and Mathematical Modelling, Technical University of Denmark and Richard Petersens Plads, Kongens Lyngby, Denmark

  • Venue:
  • Nordic Journal of Computing - Selected papers of the 17th nordic workshop on programming theory (NWPT'05), October 19-21, 2005
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

The classical key distribution protocols are based on symmetric and asymmetric encryption as well as digital signatures. Protocols with different purposes often requires different cryptographic primitives, an example is electronic voting protocols which are often based on the cryptographic operation blinding. In this paper we study the theoretical foundations for one of the successful approaches to validating cryptographic protocols and we extend it to handle the blinding primitive. Our static analysis approach is based on Flow Logic; this gives us a clean separation between the specification of the analysis and its realisation in an automatic tool. We concentrate on the former in the present paper and provide the semantic foundation for our analysis of protocols using blinding - also in the presence of malicious attackers.