Security Protocols as Choreographies
Research output: Conference Article in Proceeding or Book/Report chapter › Article in proceedings › Research › peer-review
A choreography gives a description of how endpoints in a concurrent systems should exchange messages during its execution. In this paper, we informally introduce a choreographic language for describing security protocols and a property language for expressing non-trivial security properties of such protocols. We motivate this work using the envelope protocol [2] as an example, which ensures auditable transfers by means of a TPM, that guarantees that the issuer of a message always learns whether such message has been opened or not. We then take an implementation of the TPM formulated as an API and discuss how such implementation and the usage of the TPM in the protocol can be related. Finally, we illustrate how the protocol and property descriptions can be translated into multiset rewrite rules and metric first order logic respectively, in order to check if auditable transfer holds.
Original language | English |
---|---|
Title of host publication | Security Protocols as Choreographies : Joshua Guttman's Festschrift |
Number of pages | 111 |
Publisher | Springer |
Publication date | 2021 |
Pages | 98 |
DOIs | |
Publication status | Published - 2021 |
ID: 86126643