sequential process calculus and machine models for
play

Sequential Process Calculus and Machine Models for Simulation-based - PowerPoint PPT Presentation

Sequential Process Calculus and Machine Models for Simulation-based Security Ralf K usters University of Kiel Joint work with Anupam Datta, John Mitchell, and Ajith Ramanathan University of Kiel Ralf K usters Simulation-based Security


  1. Sequential Process Calculus and Machine Models for Simulation-based Security Ralf K¨ usters University of Kiel Joint work with Anupam Datta, John Mitchell, and Ajith Ramanathan

  2. University of Kiel Ralf K¨ usters Simulation-based Security Basic idea: 1. Describe security requirement in terms of an ideal protocol/functionality F . 2. A real protocol P is secure w.r.t. F (realizes F ) if everything that can happen to P can also happen to F . 3. Goal: Security preserved under composition (composition theorem). DIMACS Workshop June 8th, 2004

  3. University of Kiel Ralf K¨ usters Simulation-based Security Basic idea: 1. Describe security requirement in terms of an ideal protocol/functionality F . 2. A real protocol P is secure w.r.t. F (realizes F ) if everything that can happen to P can also happen to F . 3. Goal: Security preserved under composition (composition theorem). But... Many different computational settings and security notions. DIMACS Workshop June 8th, 2004

  4. University of Kiel Ralf K¨ usters Canetti 2001 (PITM) Computational model: 1. Computational entities: Probabilistic polynomial-time interacting turing machines (PITMs) 2. Communication model: In a real, ideal, and hybrid model specific ways of communication via tapes between an environment, a (real/ideal) adversary, and the (real/ideal) protocol are defined. DIMACS Workshop June 8th, 2004

  5. University of Kiel Ralf K¨ usters Canetti 2001 (PITM) Computational model: 1. Computational entities: Probabilistic polynomial-time interacting turing machines (PITMs) 2. Communication model: In a real, ideal, and hybrid model specific ways of communication via tapes between an environment, a (real/ideal) adversary, and the (real/ideal) protocol are defined. Security notion: Universal composability (UC). P and F are UC if ∀ A ∃ I ∀ E : E E ≡ A P I F DIMACS Workshop June 8th, 2004

  6. University of Kiel Ralf K¨ usters Pfitzmann and Waidner 2001 (PIOA) Computational model: 1. Computational entities: Probabilistic IO automata (PIOAs) 2. Communication model: General communication model where PIOAs communicate through buffers that need to be triggered to deliver a message. (No need to distinguish between real, ideal, and hybrid communication.) DIMACS Workshop June 8th, 2004

  7. University of Kiel Ralf K¨ usters Pfitzmann and Waidner 2001 (PIOA) Computational model: 1. Computational entities: Probabilistic IO automata (PIOAs) 2. Communication model: General communication model where PIOAs communicate through buffers that need to be triggered to deliver a message. (No need to distinguish between real, ideal, and hybrid communication.) Security notions: UC + (strong) Black-box Simulatability (SBB). P and F are SBB if ∃ S ∀ A ∀ E : E E ≡ A ′ A P S F DIMACS Workshop June 8th, 2004

  8. University of Kiel Ralf K¨ usters Weak Black-box Simulatability (WBB) P and F are WBB if ∀ A ∃ S ∀ E : E E ≡ A ′ A P S F Used in the literature to show UC (obviously: WBB implies UC). DIMACS Workshop June 8th, 2004

  9. University of Kiel Ralf K¨ usters Lincoln, Mitchell 2 , Scedrov 1998 (PPC) Computational model: 1. Computational entities: Probabilistic Polynomial-time Processes 2. Communication model: Probabilistic Process Calculus (PPC). DIMACS Workshop June 8th, 2004

  10. University of Kiel Ralf K¨ usters Lincoln, Mitchell 2 , Scedrov 1998 (PPC) Computational model: 1. Computational entities: Probabilistic Polynomial-time Processes 2. Communication model: Probabilistic Process Calculus (PPC). Security notions: Process Congruence/Strong Simulatability (SS) P and F are SS if ∃ S ∀ E : E E ≡ P S F DIMACS Workshop June 8th, 2004

  11. University of Kiel Ralf K¨ usters Even More Variety Different variants of UC, BB, and SS have been considered! DIMACS Workshop June 8th, 2004

  12. University of Kiel Ralf K¨ usters UC P and F are UC if ∀ A ∃ I ∀ E : E E ≡ A P I F Distinguish between different tasks the processes perform: DIMACS Workshop June 8th, 2004

  13. University of Kiel Ralf K¨ usters UC P and F are UC if ∀ A ∃ I ∀ E : E E ≡ A P I F Distinguish between different tasks the processes perform: Decision (distinguisher) process (D): May output a decision 1 or 0 depending on who the process believes to interact with. (environment) DIMACS Workshop June 8th, 2004

  14. University of Kiel Ralf K¨ usters UC P and F are UC if ∀ A ∃ I ∀ E : E E ≡ A P I F Distinguish between different tasks the processes perform: Decision (distinguisher) process (D): May output a decision 1 or 0 depending on who the process believes to interact with. (environment) Master process (M): Is triggered if no other process can go. DIMACS Workshop June 8th, 2004

  15. University of Kiel Ralf K¨ usters UC P and F are UC if ∀ A ∃ I ∀ E : E E ≡ A P I F Distinguish between different tasks the processes perform: Decision (distinguisher) process (D): May output a decision 1 or 0 depending on who the process believes to interact with. (environment) Master process (M): Is triggered if no other process can go. Master decision process (MD): Is both master and decision process. DIMACS Workshop June 8th, 2004

  16. University of Kiel Ralf K¨ usters UC P and F are UC if ∀ A ∃ I ∀ E : E E ≡ A P I F Distinguish between different tasks the processes perform: Decision (distinguisher) process (D): May output a decision 1 or 0 depending on who the process believes to interact with. (environment) Master process (M): Is triggered if no other process can go. Master decision process (MD): Is both master and decision process. Regular process (R): Is neither a master nor a decision process. (e.g., real and ideal protocol) DIMACS Workshop June 8th, 2004

  17. University of Kiel Ralf K¨ usters UC P and F are UC if ∀ A ∃ I ∀ E : E E ≡ A P I F Distinguish between different tasks the processes perform: Decision (distinguisher) process (D): May output a decision 1 or 0 depending on who the process believes to interact with. (environment) Master process (M): Is triggered if no other process can go. Master decision process (MD): Is both master and decision process. Regular process (R): Is neither a master nor a decision process. (e.g., real and ideal protocol) Who should be the master process? DIMACS Workshop June 8th, 2004

  18. University of Kiel Ralf K¨ usters UC P and F are UC if ∀ A ∃ I ∀ E : E E ≡ A P I F Literature provides different answers: UC( A : R , I : R , E : MD ) Canetti 2001 DIMACS Workshop June 8th, 2004

  19. University of Kiel Ralf K¨ usters UC P and F are UC if ∀ A ∃ I ∀ E : E E ≡ A P I F Literature provides different answers: UC( A : R , I : R , E : MD ) Canetti 2001 UC( A : M , I : M , E : D ) Pfitzmann, Waidner 2001 DIMACS Workshop June 8th, 2004

  20. University of Kiel Ralf K¨ usters UC P and F are UC if ∀ A ∃ I ∀ E : E E ≡ A P I F Literature provides different answers: UC( A : R , I : R , E : MD ) Canetti 2001 UC( A : M , I : M , E : D ) Pfitzmann, Waidner 2001 UC( A : M , I : M , E : MD ) Backes, Pfitzmann, Waidner 2004 DIMACS Workshop June 8th, 2004

  21. University of Kiel Ralf K¨ usters SBB P and F are SBB if ∃ S ∀ A ∀ E : E E ≡ A ′ A P S F Variants: SBB( A : M , S : M , E : D ) Pfitzmann, Waidner 2001 SBB( A : M , S : M , E : MD ) Backes, Pfitzmann, Waidner 2004 SBB( A : M , S : R , E : MD ) SBB( A : R , S : M , E : MD ) SBB( A : R , S : R , E : MD ) SBB( A : M , S : R , E : D ) DIMACS Workshop June 8th, 2004

  22. University of Kiel Ralf K¨ usters Weak Black-box Simulatability (WBB) P and F are WBB if ∀ A ∃ S ∀ E : E E ≡ A ′ A P S F Variants: WBB( A : M , S : M , E : MD ) WBB( A : M , S : R , E : MD ) WBB( A : R , S : M , E : MD ) WBB( A : R , S : R , E : MD ) WBB( A : M , S : M , E : D ) WBB( A : M , S : R , E : D ) DIMACS Workshop June 8th, 2004

  23. University of Kiel Ralf K¨ usters SS P and F are SS if ∃ S ∀ E : E E ≡ P S F Variants: SS( S : R , E : MD ) SS( S : M , E : MD ) DIMACS Workshop June 8th, 2004

  24. University of Kiel Ralf K¨ usters Relationship Between the Security Notions Across Models? DIMACS Workshop June 8th, 2004

  25. University of Kiel Ralf K¨ usters Relationship Between the Security Notions Across Models? First, need general computational model that “subsumes” all other models. DIMACS Workshop June 8th, 2004

  26. University of Kiel Ralf K¨ usters Relationship Between the Security Notions Across Models? First, need general computational model that “subsumes” all other models. We introduce Sequential Probabilistic Process Calculus (SPPC). DIMACS Workshop June 8th, 2004

  27. University of Kiel Ralf K¨ usters Sequential Probabilistic Process Calculus (SPPC) Syntactic and semantic restriction and extension of PPC. Example process (simplified) corresponding to an IO automaton/ITM: � � Q = ! q ( n ) in ( c s , x s ) . in ( c, x ) . out ( c ns , T ns ( c, x, x s )) || c ∈C in �� � � in ( c ns , � x ′ s , c ′ , y � ) . out ( c s , x ′ s ) || out ( c ′ , y ) c ′ ∈C out Parallel composition of processes: E || A || P Polynomial composition of processes (used in composition theorem): E || A || ! q ( n ) P DIMACS Workshop June 8th, 2004

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend