Lectures by Catuscia
Palamidessi, INRIA Futurs
and LIX, France
Title: Specification and verification of randomized security
protocols
Abstract: Randomization is used often in security for achieving
the intended results. Examples include protocols for contract-signing
based on Oblivious Transfer, and certain protocols for guarranteeing
anonimity. In these lectures I will show how these protocols and the
desired properties can be expressed and verified using the
probablistic pi-calculus.
Lectures and Slides
- Lecture 1 (Feb 1, 2005): Background on Probability theory and
Probabilistic Automata [ppt]
- Lecture 1 (Feb 2, 2005): The probabilistic pi-calculus [ppt]
- Lecture 3 (Feb 3, 2005): Applications to security:
- Probabilistic Anonymity [openoffice , ps]
- Partial secret exchange
[ps]
Bibliography
Most of the relevant references are indicated in the slides. In
addition, The third lecture is based on the following material:
-
Mohit Bhargava and Catuscia Palamidessi. Probabilistic Anonymity.
Technical report [ps].
-
Kostas Chatzikokolakis and Catuscia Palamidessi. A Framework for
Analyzing Probabilistic Protocols and its Application to the Partial Secrets Exchange.
Technical report [pdf].
For further reading, we can recommend the following works
-
Martín Abadi, Andrew D. Gordon.
A Calculus for Cryptographic Protocols: The Spi Calculus.
Information and Computation, 148(1), pp. 1-70, 1999.
[ps of report version].
- P. Mateus, J.C. Mitchell, and A. Scedrov.
Composition of cryptographic protocols
in a probabilistic polynomial-time process calculus.
In: R. Amadio and D. Lugiez, eds.,
"CONCUR 2003 - Concurrency Theory",
14-th International Conference, Marseille, France, September 2003,
Springer LNCS Volume 2761, Springer-Verlag, 2003, pp. 327-349.
[
ps]
- G. Norman and V. Shmatikov. Analysis of probabilistic contract signing.
In BCSFACS Formal Aspects of Security (FASec '02), 2002.
[ps]
Last update Feb 6, 2005, by
Catuscia
Palamidessi