Verifying Accountability for Unbounded Sets of Participants

06/22/2020
by   Kevin Morio, et al.
0

Little can be achieved in the design of security protocols without trusting at least some participants. This trust should be justified; or, at the very least, subject to examination. A way of strengthening trustworthiness is to hold parties accountable for their actions, as this provides strong incentives to refrain from malicious behavior. This has lead to an increased interest in accountability in the design of security protocols. In this work, we combine the accountability definition of Künnemann, Esiyok, and Backes, with the notion of case tests to extend its applicability to protocols with unbounded sets of participants. We propose a general construction of verdict functions and a set of verification conditions which achieve soundness and completeness. Expressing the verification conditions in terms of trace properties allows us to extend Tamarin—a protocol verification tool—with the ability to analyze and verify accountability properties in a highly automated way. In contrast to prior work, our approach is significantly more flexible and applicable to a wide range of protocols.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/28/2018

Automated Verification of Accountability in Security Protocols

Accounting for misbehavior, instead of postulating trustworthiness, has ...
research
05/19/2019

Verification of Threshold-Based Distributed Algorithms by Decomposition to Decidable Logics

Verification of fault-tolerant distributed protocols is an immensely dif...
research
07/11/2011

Extend Commitment Protocols with Temporal Regulations: Why and How

The proposal of Elisa Marengo's thesis is to extend commitment protocols...
research
07/18/2022

From Infinity to Choreographies: Extraction for Unbounded Systems

Choreographies are formal descriptions of distributed systems, which foc...
research
10/07/2019

Towards a Data Centric Approach for the Design and Verification of Cryptographic Protocols

We propose MetaCP, a Meta Cryptography Protocol verification tool, as an...
research
11/13/2019

Decidable Inductive Invariants for Verification of Cryptographic Protocols with Unbounded Sessions

We develop a theory of decidable inductive invariants for an infinite-st...
research
05/14/2021

On the Soundness of Infrastructure Adversaries

Companies and network operators perform risk assessment to inform policy...

Please sign up or login with your details

Forgot password? Click here to reset