Skip to main content

Game Semantics Model for Security Protocols

  • Conference paper
Formal Methods and Software Engineering (ICFEM 2005)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 3785))

Included in the following conference series:

Abstract

Our aim is to present a game semantics model for the specification of security protocols. Game semantics has been used to give an operational flavor to denotational semantics, thereby combining the best of both worlds by having an elegant mathematical structure and at the same time describing steps of execution. Game semantics was successfully used to prove full abstraction of PCF and has since been used to describe the semantics of a variety of programming languages. It fits naturally in the framework of security protocols as the interactions between communicating parties can be described as moves in a game, where honest agents are the players and the intruder is the opponent. We propose a game-based calculus for the specification of security protocols. First, we define games that represent interactions in security protocols, these games are then used to ascribe denotational semantics to security protocols.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Abadi, M.: Secrecy by typing in security protocols. In: Ito, T., Abadi, M. (eds.) TACS 1997. LNCS, vol. 1281, pp. 611–638. Springer, Heidelberg (1997)

    Chapter  Google Scholar 

  2. Abadi, M.: Security protocols and their properties. In: Bauer, F.L., Steinbrueggen, R. (eds.) Foundations of Secure Computation, 20th Int. Summer School, Marktoberdorf, Germany, pp. 39–60. IOS Press, Amsterdam (2000)

    Google Scholar 

  3. Abadi, M., Gordon, A.B.: A calculus for cryptographic protocols: The SPI calculus. In: Proceedings of the 4th ACM Conference on Computer and Communications Security (1997)

    Google Scholar 

  4. Abramsky, S.: Semantics of interaction: An introduction to game semantics. In: Dybjer, P., Pitts, A. (eds.) Proceedings of the 1996 CLiCS Summer School, Isaac Newton Institute. Cambridge University Press, Cambridge (1997)

    Google Scholar 

  5. Abramsky, S., Malacaria, P., Jagadeesan, R.: Full abstraction for PCF. In: Theoretical Aspects of Computer Software, pp. 1–15 (1994)

    Google Scholar 

  6. Adi, K.: Formal Specification and Analysis of Security Protocols. PhD thesis, Universite Laval (2002)

    Google Scholar 

  7. Blass, A.: A game semantics for linear logic. Annals of Pure and Applied Logic 56, 183–220 (1992)

    Article  MATH  MathSciNet  Google Scholar 

  8. Burrows, M., Abadi, M., Needham, R.: A logic of authntication. Technical report, Digital Systems Research Center

    Google Scholar 

  9. Dolev, D., Yao, A.: On the security of public key protocols. IEEE transactions on information theory 29(2), 198–208 (1983)

    Article  MATH  MathSciNet  Google Scholar 

  10. Farmer, W.M.: A basic extended simple type theory. Technical report, McMaster University (2001)

    Google Scholar 

  11. Hyland, J.M.E., Ong, C.-H.L.: On full abstraction for PCF: I, II, III. Info. and Comp. 163, 285–408 (2000)

    Article  MATH  MathSciNet  Google Scholar 

  12. Kahler, D., Kusters, R., Wilke, T.: Deciding properties of contract signing protocols. In: Diekert, V., Durand, B. (eds.) STACS 2005. LNCS, vol. 3404, pp. 158–169. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  13. Kremer, S., Raskin, J.: A game approach to the verification of exchange protocols - application to non-repudiation protocols. In: Proceedings of the Workshop on Issues in the Theory of Security, WITS 2000 (2000)

    Google Scholar 

  14. Kremer, S., Raskin, J.: Game analysis of abuse-free contract signing. In: Proceedings of the 15th IEEE Computer Security Foundations Workshop (CSFW 2002). IEEE Computer Society Press, Los Alamitos (2002)

    Google Scholar 

  15. Lorenz, K.: Basic objectives of dialogue logic in historical perspective. Synthese (Elsevier) 127(1-2) (April/May 2001)

    Google Scholar 

  16. Meadows, C.: Formal methods for cryptographic protocol analysis: Emerging issues and trends. IEEE Journal on Selected Areas in Communication 21(1), 44–54 (2003)

    Article  Google Scholar 

  17. Needham, R., Schroeder, M.: Using encryption for authentication in large networks of computers. Communications of the ACM 21(12) (1978)

    Google Scholar 

  18. Paulson, L.C.: The inductive approach to verifying cryptographic protocols. Journal of Computer Security (6), 85–128 (1998)

    Google Scholar 

  19. Thayer, J., Herzog, J., Guttman, J.: Strand spaces: Proving security protocols correct. Journal of Computer Security (7), 191–230 (1999)

    Google Scholar 

  20. Woo, T.Y.C., Lam, S.S.: A lesson on authentication protocol design. Operating Systems Review, 24–37 (1994)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Debbabi, M., Saleh, M. (2005). Game Semantics Model for Security Protocols. In: Lau, KK., Banach, R. (eds) Formal Methods and Software Engineering. ICFEM 2005. Lecture Notes in Computer Science, vol 3785. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11576280_10

Download citation

  • DOI: https://doi.org/10.1007/11576280_10

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-29797-0

  • Online ISBN: 978-3-540-32250-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics