Task-PIOAs and Security Verification
Basic Theory of Task-PIOAs
The task-PIOA framework is a variant of the PIOA framework. It's
defining feature is a less powerful mechanism for resolving
nondeterminstic choices. This mechanism is based on the notion of
tasks, which are equivalence classes of system actions that are
scheduled by oblivious, global task sequences.
- Task-Structured Probabilistic I/O Automata.
Ran Canetti, Ling Cheung, Dilsun Kaynar, Moses Liskov,
Nancy Lynch, Olivier Pereira and Roberto Segala.
Oblivious Transfer Case Study
We have successfully applied the task-PIOA framework to analyze
an oblivious transfer protocol.
- Analyzing Security Protocol Using Time-Bounded Task-PIOAs.
Ran Canetti, Ling Cheung, Dilsun Kaynar, Moses Liskov,
Nancy Lynch, Olivier Pereira, and Roberto Segala.
- In Journal of Discrete Event Dynamic Systems (DEDS),
volume 18, number 1, March 2008. pdf
- Using Task-Structured Probabilistic I/O Automata to Analyze
an Oblivious Transfer Protocol.
Ran Canetti, Ling Cheung, Dilsun Kaynar, Moses Liskov,
Nancy Lynch, Olivier Pereira and Roberto Segala.
- In Proceedings of the 20th International Symposium on
Distributed Computing (DISC'06), Stockholm, Sweden,
September 2006. pdf
- MIT CSAIL Technical Report
MIT-CSAIL-TR-2006-047 (June 2006).
- An earlier version appears as
MIT-CSAIL-TR-2006-019 (March 2006).
- Using Probabilistic I/O Automata to Analyze an Oblivious
Transfer Protocol.
Ran Canetti, Ling Cheung, Dilsun Kaynar, Moses Liskov,
Nancy Lynch, Olivier Pereira and Roberto Segala.
- MIT CSAIL Technical Report
MIT-CSAIL-TR-2006-046 (June 2006), also cited as
MIT-LCS-TR-1001a.
- An earlier version appears as
MIT-CSAIL-TR-2005-055 (December 2005), also cited
as MIT-LCS-TR-1001.
- Cryptology ePrint Archive Report 2005/452. html
Scheduling in Simulation-Based Security
we add a new dimension to the analysis of simulation-based
security, namely, the scheduling of concurrent processes. We show
that, when we move from sequential scheduling (as used in previous
studies) to task-based nondeterministic scheduling, the same
logical statement gives rise to incomparable notions of security.
Under task-based scheduling, the hierarchy based on placement of
``master process'' becomes obsolete, because no such designation
is necessary to obtain meaningful runs of a system. On the other
hand, the existence of ``forwarder processes'' remains an
important factor.
- On the Role of Scheduling in Simulation-Based Security
Ran Canetti, Ling Cheung, Nancy Lynch, and Olivier Pereira.
- In 7th International Workshop on Issues in the Theory of Security (WITS'07), Braga, Portugal, March 2007. pdf
- Cryptology ePrint Archive Report 2007/102. html
Compositional Security
We define secure emulation for the task-PIOA framework, in the
spirit of UC-emulation proposed by Canetti. Our notion of secure
emulation is composable, and is preserved when we apply a hiding
operator.
- Compositional Security for Task-PIOAs.
Ran Canetti, Ling Cheung, Dilsun Kaynar, Nancy Lynch, and
Olivier Pereira.
- In Proceedings of the 20th IEEE Computer Security
Foundations Symposium, Venice, Italy, July 2007. pdf
- Using Task-Structured Probabilistic I/O Automata to Analyze
Cryptographic Protocols.
Ran Canetti, Ling Cheung, Dilsun Kaynar, Moses Liskov,
Nancy Lynch, Olivier Pereira, and Roberto Segala.
- In Proceedings of the Workshop on Formal and
Computational Cryptography - FCC 2006, pp. 34-39, July 2006.
pdf
- Using Probabilistic I/O Automata to Improve the Analysis of
Cryptographic Protocols.
Ran Canetti, Ling Cheung, Dilsun Kaynar, Moses Liskov,
Nancy Lynch, Olivier Pereira, and Roberto Segala.
- In ERCIM News 63:40-41, October 2005. html
Modeling Long-Lived Security
This work proposes a new paradigm for the analysis of long-lived
security protocols. Entities are active for a potentially
unbounded amount of real time, provided they perform only a
polynomial amount of work per unit of real time. Moreover,
the space used by these entities is allocated dynamically and
must be polynomially bounded. A new notion of long-term
implementation is proposed and shown to be preserved under
polynomial parallel composition and exponential sequential
composition. The use of this new paradigm is illustrated in
an analysis of the long-lived timestamping protocol of Haber
and Kamat.
- Modeling Computational Security in Long-Lived Systems.
Ran Canetti, Ling Cheung, Dilsun Kaynar, Nancy Lynch, and
Olivier Pereira.
- To appear in CONCUR 2008: 19th International Conference
on Concurrency Theory, Toronto, Canada, August 2008. pdf
- Cryptology ePrint Archive Report 2007/406. html
Applications and Case Studies
- Verifying Statistical Zero Knowledge with Approximate
Implementations
Ling Cheung, Sayan Mitra, and Olivier Pereira.
- Cryptology ePrint Archive Report 2007/195. html
- Automatic Verification of Simulatability in Security
Protocols.
Tadashi Araragi and Olivier Pereira.
- In Proceedings of the Workshop on Formal and
Computational Cryptography FCC 2007, July 2007.
People
Last modified: Mon Jun 30 00:05:54 EDT 2008