Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1109/SP.2008.23guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol

Published: 18 May 2008 Publication History

Abstract

We devise an abstraction of zero-knowledge protocols that is accessible to a fully mechanized analysis. The abstraction is formalized within the applied pi-calculus using a novel equational theory that abstractly characterizes the cryptographic semantics of zero-knowledge proofs. We present an encoding from the equational theory into a convergent rewriting system that is suitable for the automated protocol verifier ProVerif. The encoding is sound and fully automated. We successfully used ProVerif to obtain the first mechanized analysis of (a simplified variant of) the Direct Anonymous Attestation (DAA) protocol. This required us to devise novel abstractions of sophisticated cryptographic security definitions based on interactive games. The analysis reported a novel attack on DAA that was overlooked in its existing cryptographic security proof. We propose a revised variant of DAA that we successfully prove secure using ProVerif.

Cited By

View all
  • (2024)Provably Secure Communication Protocols for Remote AttestationProceedings of the 19th International Conference on Availability, Reliability and Security10.1145/3664476.3664485(1-12)Online publication date: 30-Jul-2024
  • (2024)An anonymous authentication scheme with conditional privacy-preserving for Vehicular Ad hoc Networks based on zero-knowledge proof and BlockchainAd Hoc Networks10.1016/j.adhoc.2023.103349154:COnline publication date: 12-Apr-2024
  • (2019)A Novel Protocol for Security of Location Based Services in Multi-agent SystemsWireless Personal Communications: An International Journal10.1007/s11277-019-06499-4108:3(1841-1868)Online publication date: 1-Oct-2019
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
SP '08: Proceedings of the 2008 IEEE Symposium on Security and Privacy
May 2008
408 pages
ISBN:9780769531687

Publisher

IEEE Computer Society

United States

Publication History

Published: 18 May 2008

Author Tags

  1. Language-based security
  2. applied pi-calculus
  3. automated verification
  4. zero-knowledge

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 16 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Provably Secure Communication Protocols for Remote AttestationProceedings of the 19th International Conference on Availability, Reliability and Security10.1145/3664476.3664485(1-12)Online publication date: 30-Jul-2024
  • (2024)An anonymous authentication scheme with conditional privacy-preserving for Vehicular Ad hoc Networks based on zero-knowledge proof and BlockchainAd Hoc Networks10.1016/j.adhoc.2023.103349154:COnline publication date: 12-Apr-2024
  • (2019)A Novel Protocol for Security of Location Based Services in Multi-agent SystemsWireless Personal Communications: An International Journal10.1007/s11277-019-06499-4108:3(1841-1868)Online publication date: 1-Oct-2019
  • (2017)The Applied Pi CalculusJournal of the ACM10.1145/312758665:1(1-41)Online publication date: 26-Oct-2017
  • (2017)Dual protocols for private multi-party matrix multiplication and trust computationsComputers and Security10.1016/j.cose.2017.04.01371:C(51-70)Online publication date: 1-Nov-2017
  • (2016)Bounding the Number of Agents, forźEquivalence TooProceedings of the 5th International Conference on Principles of Security and Trust - Volume 963510.5555/3089491.3089505(211-232)Online publication date: 2-Apr-2016
  • (2015)Blinded additively homomorphic encryption schemes for self-tallying votingJournal of Information Security and Applications10.1016/j.jisa.2014.07.00222:C(40-53)Online publication date: 1-Jun-2015
  • (2014)Machine-generated algorithms, proofs and software for the batch verification of digital signature schemesJournal of Computer Security10.5555/2699777.269977822:6(867-912)Online publication date: 1-Nov-2014
  • (2014)Union, intersection and refinement types and reasoning about type disjointness for secure protocol implementationsJournal of Computer Security10.5555/2595841.259584522:2(301-353)Online publication date: 1-Mar-2014
  • (2014)Data minimisation in communication protocolsInternational Journal of Information Security10.1007/s10207-014-0235-z13:6(529-569)Online publication date: 1-Nov-2014
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media