• DocumentCode
    2994825
  • Title

    Formalization and proof of secrecy properties

  • Author

    Volpano, Dennis

  • Author_Institution
    Dept. of Comput. Sci., Naval Postgraduate Sch., Monterey, CA, USA
  • fYear
    1999
  • fDate
    1999
  • Firstpage
    92
  • Lastpage
    95
  • Abstract
    After looking at the security literature, you will find secrecy is formalized in different ways, depending on the application. Applications have threat models that influence our choice of secrecy properties. A property may be reasonable in one context and completely unsatisfactory in another if other threats exist. The primary goal of this paper is to foster discussion on what sorts of secrecy properties are appropriate for different applications and to investigate what they have in common. We also want to explore what is meant by secrecy in different contexts. Perhaps there is enough overlap among our threat models that we can begin to identify some key secrecy properties for wider application. Currently, secrecy is treated in rather ad hoc ways. With some agreement among calculi for expressing protocols and systems, we might even be able to use one another´s proof techniques for proving secrecy
  • Keywords
    cryptography; protocols; formalization; proof of secrecy properties; proof techniques; protocols; threat models; Application software; Computer science; Computer security; Cryptography; Identity-based encryption; Protocols; Testing;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computer Security Foundations Workshop, 1999. Proceedings of the 12th IEEE
  • Conference_Location
    Mordano
  • ISSN
    1063-6900
  • Print_ISBN
    0-7695-0201-6
  • Type

    conf

  • DOI
    10.1109/CSFW.1999.779765
  • Filename
    779765