Abstract
In recent years, many cryptography protocols have been designed for many different scenarios, with the purpose of preserving security of communications as well as privacy and anonymity of participant entities. In general, every proposed solution has possed a real challenge to the existing formal methods of protocol analysis and verification. The main goal of this work is the proposal of a logic to reason about privacy-enhancing monotonic and non–monotonic cryptography protocols. The new logic will be called L-PEP and it extends the existing Rubin’s logic of beliefs.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Meadows, C.: Formal methods for cryptographic protocol analysis: emerging issues and trends. IEEE Journal on Selected Areas in Communications 21(1) (2003)
Privacy and identity management for europe (prime). Privacy and Identity Management for Europe (PRIME), https://www.prime-project.eu
Burrows, M., Abadi, M., Needham, R.: A logic of authentication. ACM Transactions on Computer Systems 8(1), 18–36 (1990)
Abadi, M., Tuttle, M.: A semantics for a logic of authentication. In: Proceedings of the ACM Symposium of Principles of Distributed Computing, pp. 201–216. ACM Press, New York (1991)
Moser, L.: A logic of knowledge and belief for reasoning about computer security. In: Proceedings of the Computer Security Foundations Workshop II, pp. 57–63 (June 1989)
Rubin, A.D.: Nonmonotonic cryptographic protocols. In: Proceedings of the Computer Security Foundations Workshop, pp. 100–116 (1994)
Meadows, C., Syverson, P.F.: A Formal Specification of Requirements for Payment Transactions in the SET Protocol. In: Hirschfeld, R. (ed.) FC 1998. LNCS, vol. 1465, pp. 122–140. Springer, Heidelberg (1998)
Xu, Y., Xie, X.: Analysis of electronic commerce protocols based on extended rubin logic. In: Proceedings of the 9th International Conference for Young Computer Scientists, Washington, DC, USA, pp. 2079–2084. IEEE Computer Society, Los Alamitos (2008)
Xu, Y., Xie, X.: Analysis of authentication protocols based on rubin logic. In: 4th International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2008, pp. 1–5 (2008)
Xu, Y., Xie, X.: Security analysis of routing protocol for manet based on extended rubin logic. In: IEEE International Conference on Networking, Sensing and Control, ICNSC 2008, pp. 1326–1331 (2008)
Teepe, W.: On ban logic and hash functions or: how an unjustified inference rule causes problems. Autonomous Agents and Multi-Agent Systems 19(1), 76–88 (2009)
Agray, N., van der Hoek, W., de Vink, E.P.: On ban logics for industrial security protocols. In: Dunin-Keplicz, B., Nawarecki, E. (eds.) CEEMAS 2001. LNCS (LNAI), vol. 2296, pp. 29–36. Springer, Heidelberg (2002)
Alcaide, A., Estévez-Tapiador, J., Hernandez Castro, J., Ribagorda, A.: Nature–inspired synthesis of rational protocols. In: Rudolph, G., Jansen, T., Lucas, S., Poloni, C., Beume, N. (eds.) PPSN 2008. LNCS, vol. 5199, pp. 981–990. Springer, Heidelberg (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Alcaide, A., Abdallah, A.E., González–Tablas, A.I., de Fuentes, J.M. (2011). L–PEP: A Logic to Reason about Privacy–Enhancing Cryptography Protocols. In: Garcia-Alfaro, J., Navarro-Arribas, G., Cavalli, A., Leneutre, J. (eds) Data Privacy Management and Autonomous Spontaneous Security. DPM SETOP 2010 2010. Lecture Notes in Computer Science, vol 6514. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-19348-4_9
Download citation
DOI: https://doi.org/10.1007/978-3-642-19348-4_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-19347-7
Online ISBN: 978-3-642-19348-4
eBook Packages: Computer ScienceComputer Science (R0)