Formalization and Automation of Security Proof by Sequences of Games(<Special Topics> Formal Approach to Information Security)
-
- Mano Ken
- コミュニケーション科学基礎研究所
-
- Sakurada Hideki
- NTTコミュニケーション科学基礎研究所
-
- Kawabe Yoshinobu
- 日本電信電話株式会社NTTコミュニケーション科学基礎研究所
-
- Tsukada Yasuyuki
- コミュニケーション科学基礎研究所
Bibliographic Information
- Other Title
-
- ゲーム列による安全性証明の形式化と自動化(<特集>数理的技法による情報セキュリティ)
- ゲーム列による安全性証明の形式化と自動化
- ゲームレツ ニ ヨル アンゼンセイ ショウメイ ノ ケイシキカ ト ジドウカ
Search this article
Description
Recently extensive research has been undertaken on the computational foundations of symbolic proof methods for security protocols. There are two approaches to providing such foundations. One is to give a probabilistic re-interpretation to existing symbolic methods such as the Dolev-Yao model and justify it computationally. The other is to re-formulate traditional computational arguments in an appropriate formal system and apply symbolic methods. The former approach is called indirect while the latter is called direct. This paper introduces the direct approach. Three studies on the direct approach are dealt with here, namely those by Corin and den Hartog, by Blanchet and Pointcheval, and by Canetti et al. They all formalize security proofs by sequences of games in different formal systems. We describe the formal systems they use, how they formalize probabilistic aspects and computational intractability assumptions, and the possibility of obtaining formal security proofs automatically.
Journal
-
- Bulletin of the Japan Society for Industrial and Applied Mathematics
-
Bulletin of the Japan Society for Industrial and Applied Mathematics 17 (4), 302-310, 2007
The Japan Society for Industrial and Applied Mathematics
- Tweet
Details 詳細情報について
-
- CRID
- 1390001205765256064
-
- NII Article ID
- 110006532031
-
- NII Book ID
- AN10288886
-
- ISSN
- 09172270
- 24321982
-
- NDL BIB ID
- 9333286
-
- Text Lang
- ja
-
- Data Source
-
- JaLC
- NDL Search
- CiNii Articles
-
- Abstract License Flag
- Disallowed