首页> 外文学位 >Algorithms for cryptographic protocol verification in presence of algebraic properties.
【24h】

Algorithms for cryptographic protocol verification in presence of algebraic properties.

机译:存在代数性质的密码协议验证算法。

获取原文
获取原文并翻译 | 示例

摘要

The design of cryptographic protocols is error-prone, people have found flaws in seemingly secure protocols years after they were proposed. Therefore formal methods are needed to give a more formal guarantee that protocols are secure. In general, there are two approaches: the formal-model approach and the computational-model approach. This dissertation follows the line of the formal-model approach. Traditionally, the formal-model approach assumes the perfect encryption assumption, which means no information can possibly be released out of any encrypted message without knowing the key. But this is not true in general, there are protocols where cryptographic primitives have certain algebraic properties. This dissertation aims to relax the perfect encryption assumption.In Chapter 2, we propose a framework of rigid theorem proving modulo a flexible theory. Using this framework, we give a decision procedure for solving the prefix theory and the blind signature theory. In Chapter 3, we formulate the insecurity problem of protocols as a Cap Unification problem. We give a decision procedure for Cap Unification when the convergent system defining the intruder abilities is dwindling, with some additional assumptions satisfied by usual protocols. In Chapter 4, we extend our work in Chapter 3, we give a decision procedure for Cap Unification when the intruder capacities are modeled as homomorphic encryption theories. This is done by adding two things to the decision procedure in Chapter 3: a unification procedure modulo the homomorphic encryption theory, and some inference rules designed to deal with the homomorphic encryption theory.
机译:密码协议的设计容易出错,人们在提出安全协议后的几年里发现了看似安全的协议中的缺陷。因此,需要正式的方法来提供更加正式的协议安全性保证。通常,有两种方法:形式模型方法和计算模型方法。本文遵循形式模型方法。传统上,形式模型方法采用完美的加密假设,这意味着在不知道密钥的情况下,任何加密的消息都无法释放任何信息。但这通常是不正确的,在某些协议中,密码原语具有某些代数性质。本文旨在放松理想的加密假设。在第二章中,我们提出了一个以弹性理论为模的刚性定理证明框架。使用该框架,我们给出了解决前缀理论和盲签名理论的决策程序。在第三章中,我们将协议的不安全性问题表述为上限统一问题。当定义入侵者能力的会聚系统逐渐减少时,我们给出了统一上限的决策程序,并通过常规协议满足了一些其他假设。在第4章中,我们在第3章中扩展了我们的工作,当入侵者的能力被建模为同态加密理论时,我们给出了上限统一的决策程序。这是通过在第3章的决策过程中添加两件事来完成的:统一过程以同态加密理论为模,并且设计了一些推理规则来处理同态加密理论。

著录项

  • 作者

    Lin, Hai.;

  • 作者单位

    Clarkson University.;

  • 授予单位 Clarkson University.;
  • 学科 Computer Science.
  • 学位 Ph.D.
  • 年度 2009
  • 页码 89 p.
  • 总页数 89
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号