期刊文献+

计算可靠的密码协议形式化分析综述 被引量:10

A Survey on Computationally Sound Formal Analysis of Cryptographic Protocols
下载PDF
导出
摘要 密码协议的描述和分析有两类截然不同的方法:一类以形式化方法为主要手段,另一类以计算复杂性理论为基础.Abadi和Rogaway首次试图将这两类不同的方法关联起来,证明一个协议在形式化模型下具有某种安全属性,那么在计算模型下也保持相应的安全属性.在这一工作的带动下,形式化方法的计算可靠性研究越来越受到关注,成为密码协议分析研究的一个重要内容.围绕这一热点问题,人们做了大量的工作.该文首先对两类分析方法做概要介绍;其次对形式化分析的计算可靠性研究成果进行分类和总结,并对各种方法的主要思想进行了介绍;最后对该领域未来的研究方向进行了展望. There are two different approaches in analysis of cryptographic protocols.One isbased on formal methods,and the other is based on computational complexity as modern cryptog-raphy does.Abadi and Rogaway tried to reconcile these two approaches in their seminal work.They set up a relation for some formal results that if a security property is proved in formal model,then the corresponding property is also valid in computational model.Motivated by this work,many works appeared in this area.In this survey,we will summarize various approaches oncomputational soundness of formal methods in analysis cryptographic protocols,present theirmain ideas,and point out the future research directions in this area.
出处 《计算机学报》 EI CSCD 北大核心 2014年第5期993-1016,共24页 Chinese Journal of Computers
基金 国家自然科学基金(61170280) 中国科学院先导项目(XDA06010701) 中国科学院信息工程研究所密码基金资助~~
关键词 密码协议 形式化方法 计算可靠性 信息安全 网络安全 cryptographic protocol formal method computational soundness information security network security
  • 相关文献

参考文献108

  • 1薛锐,雷新锋.安全协议:信息安全保障的灵魂——安全协议分析研究现状与发展趋势[J].中国科学院院刊,2011,26(3):287-296. 被引量:10
  • 2薛锐,冯登国.安全协议的形式化分析技术与方法[J].计算机学报,2006,29(1):1-20. 被引量:61
  • 3Needham R M, Schroeder M D. Using encryption for authentication in large networks of computers. Communica- tions of the ACM, 1978, 21(12): 993-999. 被引量:1
  • 4Dolev D, Yao A C. On the security of public key protocols// Proceedings of the 22nd Symposium on Foundations of Computer Seienee. Oakland, USA, 1981:350-357. 被引量:1
  • 5Burrows M, Abadi M, Needham R. A Logic of Authentica- tion. Palo Alto, USA: Digital Equipment Corp. (DEC), Systems Research Center: 39, 1989. 被引量:1
  • 6Gong L, Needham R, Yahalom R. Reasoning about belief in cryptographic protocols//Proceedings of the 1990 IEEE Symposium on Research in Security and Privacy. Oakland, USA, 1990: 234-248. 被引量:1
  • 7Abadi M, Tuttle M. A semantics for a logic of authentication //Proceedings of the 10th Annual ACM Symposium on Principles of Distributed Computing. Montreal, Canada, 1991: 201-216. 被引量:1
  • 8Syverson P, van Oorschot P C. On unifying some crypto- graphic protocol logics//Proceedings of the IEEE Symposium on Research in Security and Privacy. Oakland, USA, 1994: 14-28. 被引量:1
  • 9Kailar R. Accountability in electronic commerce protocols. IEEE Transactions on Software Engineering, 1996, 22 (5): 313-328. 被引量:1
  • 10Syverson P. Adding time to a logic of authentication// Proceedings of the 1st ACM Conference on Computer and Communications Security. Fairfax, USA, 1993:97-101. 被引量:1

二级参考文献22

共引文献69

同被引文献77

引证文献10

二级引证文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部