Automated Verification of Accountability in Security Protocols

by   Robert Künnemann, et al.

Accounting for misbehavior, instead of postulating trustworthiness, has been put forward as a new paradigm in protocol design. Accountability is meant to establish trust in the first place and to recognize and react if this trust is violated. Recently, a protocol-agnostic definition of accountability was proposed, characterizing misbehavior as deviations from the protocol that cause security violations. In this work, we provide the first mechanised method for the verification of accountability and demonstrate its use for verification and attack finding on various examples from the accountability and causality literature, including Kroll's accountable algorithms protocol. We reach a high degree of automation by transferring accountability to the centralized adversary setting in which almost all protocol verification tools operate. We show that accountability can be expressed in terms of trace properties, resulting in a sound and complete verification technique.


page 1

page 2

page 3

page 4


Verifying Accountability for Unbounded Sets of Participants

Little can be achieved in the design of security protocols without trust...

Towards a Data Centric Approach for the Design and Verification of Cryptographic Protocols

We propose MetaCP, a Meta Cryptography Protocol verification tool, as an...

Towards a formally verified implementation of the MimbleWimble cryptocurrency protocol

MimbleWimble is a privacy-oriented cryptocurrency technology encompassin...

Towards automated verification of multi-party consensus protocols

Blockchain technology and related frameworks have recently received exte...

Role of Trust in OAuth 2.0 and OpenID Connect

OAuth 2.0 is a framework for authorization. Being a framework, OAuth 2.0...

Private Multi-party Matrix Multiplication and Trust Computations

This paper deals with distributed matrix multiplication. Each player own...

A Type System for Privacy Properties (Technical Report)

Mature push button tools have emerged for checking trace properties (e.g...