Automated Verification of Accountability in Security Protocols

05/28/2018
by   Robert Künnemann, et al.
0

Accounting for misbehavior, instead of postulating trustworthiness, has been put forward as a new paradigm in protocol design. Accountability is meant to establish trust in the first place and to recognize and react if this trust is violated. Recently, a protocol-agnostic definition of accountability was proposed, characterizing misbehavior as deviations from the protocol that cause security violations. In this work, we provide the first mechanised method for the verification of accountability and demonstrate its use for verification and attack finding on various examples from the accountability and causality literature, including Kroll's accountable algorithms protocol. We reach a high degree of automation by transferring accountability to the centralized adversary setting in which almost all protocol verification tools operate. We show that accountability can be expressed in terms of trace properties, resulting in a sound and complete verification technique.

READ FULL TEXT

page 1

page 2

page 3

page 4

06/22/2020

Verifying Accountability for Unbounded Sets of Participants

Little can be achieved in the design of security protocols without trust...
10/07/2019

Towards a Data Centric Approach for the Design and Verification of Cryptographic Protocols

We propose MetaCP, a Meta Cryptography Protocol verification tool, as an...
07/03/2019

Towards a formally verified implementation of the MimbleWimble cryptocurrency protocol

MimbleWimble is a privacy-oriented cryptocurrency technology encompassin...
12/04/2021

Towards automated verification of multi-party consensus protocols

Blockchain technology and related frameworks have recently received exte...
08/31/2018

Role of Trust in OAuth 2.0 and OpenID Connect

OAuth 2.0 is a framework for authorization. Being a framework, OAuth 2.0...
07/13/2016

Private Multi-party Matrix Multiplication and Trust Computations

This paper deals with distributed matrix multiplication. Each player own...
08/28/2017

A Type System for Privacy Properties (Technical Report)

Mature push button tools have emerged for checking trace properties (e.g...