Computationally Sound Compositional Logic for Key Exchange Protocols

Anupam Datta, Ante Derek, John Mitchell, Bogdan Warinschi

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

48 Citations (Scopus)

Abstract

\begin{abstract} We develop a compositional method for proving cryptographically sound security properties of key exchange protocols, based on a symbolic logic that is interpreted over conventional runs of a protocol against a probabilistic polynomial-time attacker. Since reasoning about an unbounded number of runs of a protocol involves induction-like arguments about properties preserved by each run, we formulate a specification of \emph{secure key exchange} that \cut{, unlike conventional key indistinguishability,} is closed under general composition with steps that use the key. We present formal proof rules based on this game-based condition, and prove that the proof rules are sound over a computational semantics. The proof system is used to establish security of a standard protocol in the computational model.
Translated title of the contributionComputationally Sound Compositional Logic for Key Exchange Protocols
Original languageEnglish
Title of host publicationComputer Security Foundations Workshop - CSFW 2006
PublisherIEEE Computer Society
Pages321-334
Volume-
Publication statusPublished - 2006

Bibliographical note

Other page information: 321-334
Conference Proceedings/Title of Journal: Proceedings of 19th IEEE Computer Security Foundations Workshop
Other identifier: 2000656

Fingerprint

Dive into the research topics of 'Computationally Sound Compositional Logic for Key Exchange Protocols'. Together they form a unique fingerprint.

Cite this