Conference item
Automated verification of group key agreement protocols
- Abstract:
- We advance the state-of-the-art in automated symbolic cryptographic protocol analysis by providing the first algorithm that can handle Diffie-Hellman exponentiation, bilinear pairing, and AC-operators. Our support for AC-operators enables protocol specifications to use multisets, natural numbers, and finite maps. We implement the algorithm in the TAMARIN prover and provide the first symbolic correctness proofs for group key agreement protocols that use Diffie-Hellman or bilinear pairing, loops, and recursion, while at the same time supporting advanced security properties, such as perfect forward secrecy and eCK-security. We automatically verify a set of protocols, including the STR, group Joux, and GDH protocols, thereby demonstrating the effectiveness of our approach.
- Publication status:
- Published
- Peer review status:
- Peer reviewed
Actions
Access Document
- Files:
-
-
(Preview, Accepted manuscript, pdf, 720.4KB, Terms of use)
-
- Publisher copy:
- 10.1109/SP.2014.19
Authors
- Publisher:
- IEEE
- Host title:
- 2014 IEEE Symposium on Security and Privacy
- Journal:
- 2014 IEEE Symposium on Security and Privacy More from this journal
- Pages:
- 179-194
- Publication date:
- 2014-11-20
- DOI:
- ISSN:
-
1081-6011
- ISBN:
- 9781479946860
- Keywords:
- Pubs id:
-
pubs:501429
- UUID:
-
uuid:d4bb7be9-33a0-4ffd-b68e-8c25fb2d388b
- Local pid:
-
pubs:501429
- Source identifiers:
-
501429
- Deposit date:
-
2017-01-03
Terms of use
- Copyright holder:
- Schmidt, B
- Copyright date:
- 2014
- Notes:
- © 2014, Benedikt Schmidt. Under license to IEEE.
If you are the owner of this record, you can report an update to it here: Report update to this record