MPI-INF Logo
Campus Event Calendar

Event Entry

What and Who

Analysis of modern cryptographic applications

Matteo Maffei
Talk
AG 1, AG 2, AG 3, AG 4, AG 5, SWS, RG1, RG2  
Public Audience
English

Date, Time and Location

Wednesday, 12 November 2008
15:00
30 Minutes
E1 4
024
Saarbrücken

Abstract

The last decade saw rapid and significant changes in the way people interact with each other. Ordering a book, participating in a conference, chatting with friends, and even voting for a candidate are tasks that are more and more often performed over the Internet, at home or even on the street by using a mobile device. As a consequence, many applications and devices store and exchange sensitive information and are supposed to guarantee a number of security properties, such as secrecy, authenticity, and anonymity. These properties are often difficult to formalize and to enforce, as demonstrated by the increasing number of attacks on supposedly secure applications. The social and economic consequences of such attacks witnesses the dramatic need of tools to lead the design and verify the security of distributed applications.

One of the central challenges in the analysis of complex and industrial-size systems is the capability to deal with complex cryptographic operations. While academic protocols traditionally relied only on basic and well understood cryptographic operations such as encryption and digital signatures, modern applications make usage of sophisticated cryptographic primitives offering complex security features that go far beyond traditional properties such as the secrecy and authenticity of a communication. Zero-knowledge proofs constitute the most prominent and arguably most amazing example of such primitives. A zero-knowledge proof consists of a message or a sequence of messages that combines two seemingly contradictory properties: First, it constitutes a proof of a statement that cannot be forged, i.e., it is impossible, or at least computationally infeasible, to produce a zero-knowledge proof of a wrong statement; Second, a zero-knowledge proof does not reveal any information besides the bare fact that the statement is valid. Modern applications rely on zero-knowledge proofs to achieve complex, and sometimes seemingly conflicting, security properties, for instance authenticity and anonymity.
This talk presents some recent results in the analysis of distributed applications, with a particular focus on protocols based on zero-knowledge proofs. In particular, we present an abstraction technique for protocols based on zero-knowledge proofs that is amenable to automated verification. The abstraction is formalized within a process calculus using a novel equational theory that characterizes the cryptographic semantics of zero-knowledge proofs. We show how certain properties offered by zero-knowledge proofs can be characterized in terms of authorization policies and automatically enforced by a type system. The analysis is efficient and compositional.

Contact

Bahareh Kadkhodazadeh
0681-302-70156
--email hidden
passcode not visible
logged in users only

Bahareh Kadkhodazadeh, 11/05/2008 15:30
Bahareh Kadkhodazadeh, 11/05/2008 15:30 -- Created document.