FLOC 2018: FEDERATED LOGIC CONFERENCE 2018
Model checking indistinguishability of randomized security protocols

Authors: Matthew Bauer, Rohit Chadha, Mahesh Viswanathan and Prasad Sistla

Paper Information

Title:Model checking indistinguishability of randomized security protocols
Authors:Matthew Bauer, Rohit Chadha, Mahesh Viswanathan and Prasad Sistla
Proceedings:CAV All Papers
Editors: Georg Weissenbacher, Hana Chockler and Igor Konnov
Keywords:Dolev-Yao Attacker, Protocol Verification, Randomization, Indistinguishability, Electronic Voting
Abstract:

ABSTRACT. The design of security protocols is extremely subtle and vulnerable to potentially devastating flaws. As result, many tools and techniques for the automated verification of protocol designs have been developed. Unfortunately, these tools don't have the ability to model and reason about protocols with randomization, which are becoming increasingly prevalent in systems providing privacy and anonymity guarantees. The security metrics of these systems is often formulated through a notion of indistinguishability. In this paper, we give the first algorithms for model checking indistinguishability properties of randomized security protocols against the powerful threat model of a Dolev-Yao attacker. Our techniques are implemented in the Stochastic Protocol ANalayzer (SPAN) and evaluated on several examples. As part of our evaluation, we conduct the first automated analysis of an electronic voting protocol based on the 3-ballot design.

Pages:19
Talk:Jul 17 09:15 (Session 117A: Theory and Security)
Paper: