The layered games framework for specifications and analysis of security protocols

A. Herzberg, I. Yoffe
{"title":"The layered games framework for specifications and analysis of security protocols","authors":"A. Herzberg, I. Yoffe","doi":"10.1504/IJACT.2008.021087","DOIUrl":null,"url":null,"abstract":"The layered games framework provides a solid foundation to the accepted methodology of building complex distributed systems, as a 'stack' of independently-developed protocols. Each protocol in the stack, realizes a corresponding 'layer' model, over the 'lower layer'. We define layers, protocols and related concepts. We then prove the fundamental lemma of layering. The lemma shows that given a stack of protocols {πi}i=1u, s.t. for every i ∈ {1,...u}, protocol πi realizes layer Li over layer Li-1, then the entire stack can be composed to a single protocol πu||...||1, which realizes layer Lu over layer L0. \n \nThe fundamental lemma of layering allows precise specification, design and analysis of each layer independently, and combining the results to ensure properties of the complete system. This is especially useful when considering (computationally-bounded) adversarial environments, as for security and cryptographic protocols. \n \nOur specifications are based on games, following many works in applied cryptography. This differs from existing frameworks allowing compositions of cryptographic protocols, which are based on simulatability of ideal functionality.","PeriodicalId":53552,"journal":{"name":"International Journal of Applied Cryptography","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2008-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Applied Cryptography","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1504/IJACT.2008.021087","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"Mathematics","Score":null,"Total":0}
引用次数: 8

Abstract

The layered games framework provides a solid foundation to the accepted methodology of building complex distributed systems, as a 'stack' of independently-developed protocols. Each protocol in the stack, realizes a corresponding 'layer' model, over the 'lower layer'. We define layers, protocols and related concepts. We then prove the fundamental lemma of layering. The lemma shows that given a stack of protocols {πi}i=1u, s.t. for every i ∈ {1,...u}, protocol πi realizes layer Li over layer Li-1, then the entire stack can be composed to a single protocol πu||...||1, which realizes layer Lu over layer L0. The fundamental lemma of layering allows precise specification, design and analysis of each layer independently, and combining the results to ensure properties of the complete system. This is especially useful when considering (computationally-bounded) adversarial environments, as for security and cryptographic protocols. Our specifications are based on games, following many works in applied cryptography. This differs from existing frameworks allowing compositions of cryptographic protocols, which are based on simulatability of ideal functionality.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
该分层游戏框架用于规范和分析安全协议
分层游戏框架作为独立开发协议的“堆栈”,为构建复杂分布式系统的公认方法提供了坚实的基础。堆栈中的每个协议在“较低层”之上实现相应的“层”模型。我们定义了层、协议和相关概念。然后我们证明了分层的基本引理。引理表明,给定一堆协议{πi}i=1u, s.t.对于每一个i∈{1,…u},协议πi在层Li-1上实现了层Li,那么整个栈就可以组成一个协议πu||…1,实现了层Lu在层L0之上。分层的基本引理允许对每一层进行独立的精确规范、设计和分析,并结合结果来确保整个系统的性能。这在考虑(计算有限的)对抗环境时尤其有用,例如安全性和加密协议。我们的规范是基于游戏的,遵循许多应用密码学的工作。这与现有的允许组合加密协议的框架不同,后者基于理想功能的可模拟性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
International Journal of Applied Cryptography
International Journal of Applied Cryptography Mathematics-Applied Mathematics
CiteScore
2.00
自引率
0.00%
发文量
0
期刊最新文献
Image and object encryption using multiplicative cipher and K-means clustering algorithm Efficient revocable identity-based encryption with equality test Hashing into Hessian curves A framework for universally composable non-committing blind signatures Fair threshold decryption with semi-trusted third parties
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1