2013
DOI: 10.1007/978-3-642-36830-1_5
|View full text |Cite
|
Sign up to set email alerts
|

Sound Security Protocol Transformations

Abstract: Abstract. We propose a class of protocol transformations, which can be used to (1) develop (families of) security protocols by refinement and (2) abstract existing protocols to increase the efficiency of verification tools. We prove the soundness of these transformations with respect to an expressive security property specification language covering secrecy and authentication properties. Our work clarifies and significantly extends the scope of earlier work in this area. We illustrate the usefulness of our app… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2013
2013
2018
2018

Publication Types

Select...
2
2

Relationship

3
1

Authors

Journals

citations
Cited by 4 publications
(6 citation statements)
references
References 17 publications
0
6
0
Order By: Relevance
“…In the strictly typed setting without message variables of [28], we proved the simpler substitution property f (tθ) = f (t)f (θ). In combination with Theorem 1, (1) follows directly for θ = f (θ).…”
Section: Soundness Of Type-based Abstractionsmentioning
confidence: 86%
See 4 more Smart Citations
“…In the strictly typed setting without message variables of [28], we proved the simpler substitution property f (tθ) = f (t)f (θ). In combination with Theorem 1, (1) follows directly for θ = f (θ).…”
Section: Soundness Of Type-based Abstractionsmentioning
confidence: 86%
“…Extending Hui and Lowe's work [22], we proposed in [28] a rich class of protocol abstractions and proved its soundness for a wide range of security properties. We used a type system to uniformly transform all terms of a given type (e.g., a pattern in a role specification and its instance during execution) whereas [22] only covers ground terms.…”
Section: Introductionmentioning
confidence: 92%
See 3 more Smart Citations