【24h】

Verifying Secrets and Relative Secrecy

机译:验证机密和相对机密性

获取原文

摘要

Systems that authenticate a user based on a shared secret (such as a password or PIN) normally allow anyone to query whether the secret is a given value. For example, an ATM machine allows one to ask whether a string is the secret PIN of a (lost or stolen) ATM card. Yet such queries are prohibited in any model whose programs satisfy an informationflow property like Noninterference. But there is complexity-based justification for allowing these queries. A type system is given that provides the access control needed to prove that no well-typed program can leak secrets in polynomial time, or even leak them with nonnegligible probability if secrets are of sufficient length and randomly chosen. However, there are well-typed deterministic programs in a synchronous concurrent model capable of leaking secrets in linear time.
机译:基于共享机密(例如密码或PIN)对用户进行身份验证的系统通常允许任何人查询机密是否为给定值。例如,一台ATM机允许人们询问一个字符串是否是(丢失或被盗)ATM卡的秘密PIN。但是,在程序满足诸如非干扰之类的信息流属性的任何模型中,都禁止此类查询。但是存在基于复杂度的理由来允许这些查询。给出了一种类型系统,该系统提供所需的访问控制,以证明没有好的类型的程序可以在多项式时间内泄漏机密,或者如果机密足够长且是随机选择的,则泄漏机密的概率甚至不可忽略。但是,在同步并发模型中有类型明确的确定性程序,能够在线性时间内泄漏机密。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号