【24h】

Bisimulation for Demonic Schedulers

机译:恶魔调度器的双仿真

获取原文
获取原文并翻译 | 示例

摘要

Bisimulation between processes has been proven a successful method for formalizing security properties. We argue that in certain cases, a scheduler that has full information on the process and collaborates with the attacker can allow him to distinguish two processes even though they are bisimilar. This phenomenon is related to the issue that bisimilarity is not preserved by refinement. As a solution, we introduce a finer variant of bisimulation in which processes are required to simulate each other under the "same" scheduler. We formalize this notion in a variant of CCS with explicit schedulers and show that this new bisimilarity can be characterized by a refinement-preserving traditional bisimilarity. Using a third characterization of this equivalence, we show how to verify it for finite systems. We then apply the new equivalence to anonymity and show that it implies strong probabilistic anonymity, while the traditional bisimulation does not. Finally, to illustrate the usefulness of our approach, we perform a compositional analysis of the Dining Cryptographers with a non-deterministic order of announcements and for an arbitrary number of cryptographers.
机译:事实证明,过程之间的双仿真是一种将安全属性形式化的成功方法。我们认为,在某些情况下,具有有关进程的完整信息并与攻击者协作的调度程序可以使他区分两个进程,即使它们是双相似的。这种现象与无法通过优化保留双相似性的问题有关。作为解决方案,我们引入了更好的双仿真变体,其中需要在“相同”调度程序下相互模拟的进程。我们在带有显式调度程序的CCS变体中将此概念形式化,并表明此新的双相似性可以通过保留优化的传统双相似性来表征。使用这种等效性的第三个特征,我们展示了如何对有限系统进行验证。然后,我们将新的等效性应用于匿名性,并表明它暗示了强概率匿名性,而传统的双仿真则不然。最后,为了说明我们方法的有用性,我们对用餐密码学家进行了成分分析,并以不确定的公告顺序对任意数量的密码学家进行了分析。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号