2021 IEEE Symposium on Security and Privacy (SP) 2021
DOI: 10.1109/sp40001.2021.00078
|View full text |Cite
|
Sign up to set email alerts
|

An Interactive Prover for Protocol Verification in the Computational Model

Abstract: Given the central importance of designing secure protocols, providing solid mathematical foundations and computer-assisted methods to attest for their correctness is becoming crucial. Here, we elaborate on the formal approach introduced by Bana and Comon in [10], [11], which was originally designed to analyze protocols for a fixed number of sessions and which more importantly lacks support for proof mechanization.In this paper, we present a framework and an interactive prover allowing to mechanize proofs of se… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
20
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 18 publications
(20 citation statements)
references
References 53 publications
0
20
0
Order By: Relevance
“…The Squirrel paper [5] introduces a meta-logic that introduces universal quantification over the possible traces of a protocol, as well as its number of sessions. As one can then reason at an abstract level on the traces, a single proof in the meta-logic covers multiple traces of the protocol, and it is now possible to consider unbounded protocols, thus solving both previous issues.…”
Section: The Squirrel Meta-logicmentioning
confidence: 99%
See 4 more Smart Citations
“…The Squirrel paper [5] introduces a meta-logic that introduces universal quantification over the possible traces of a protocol, as well as its number of sessions. As one can then reason at an abstract level on the traces, a single proof in the meta-logic covers multiple traces of the protocol, and it is now possible to consider unbounded protocols, thus solving both previous issues.…”
Section: The Squirrel Meta-logicmentioning
confidence: 99%
“…Concretely, our work builds on the BC logic [7] and its mechanization in the Squirrel prover [5]. The BC logic can be used to construct security proofs that provide computational guarantees against a classical (non-quantum) attacker, while only working inside a logical framework in which many intricate details have been abstracted.…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations