首页> 外文会议> >Formalization and proof of secrecy properties
【24h】

Formalization and proof of secrecy properties

机译:形式化和保密性证明

获取原文

摘要

After looking at the security literature, you will find secrecy is formalized in different ways, depending on the application. Applications have threat models that influence our choice of secrecy properties. A property may be reasonable in one context and completely unsatisfactory in another if other threats exist. The primary goal of this paper is to foster discussion on what sorts of secrecy properties are appropriate for different applications and to investigate what they have in common. We also want to explore what is meant by secrecy in different contexts. Perhaps there is enough overlap among our threat models that we can begin to identify some key secrecy properties for wider application. Currently, secrecy is treated in rather ad hoc ways. With some agreement among calculi for expressing protocols and systems, we might even be able to use one another's proof techniques for proving secrecy.
机译:查阅安全文献后,您会发现根据应用程序的不同,保密方式也不同。应用程序具有威胁模型,这些模型会影响我们对保密属性的选择。如果存在其他威胁,则资产在一种情况下可能是合理的,而在另一种情况下则可能完全不令人满意。本文的主要目的是促进讨论哪种保密属性适用于不同的应用程序,并研究它们的共同点。我们还想探讨在不同情况下保密的含义。威胁模型之间可能存在足够的重叠,我们可以开始确定一些关键的保密属性,以进行更广泛的应用。当前,保密以相当临时的方式处理。在演算之间达成某种协议表达系统和协议的共识之后,我们甚至可以使用彼此的证明技术来证明机密性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号