Achieving Security Despite Compromise Using Zero-knowledge
- 1 July 2009
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- p. 308-323
- https://doi.org/10.1109/csf.2009.24
Abstract
One of the important challenges when designing and analyzing cryptographic protocols is the enforcement of security properties in the presence of compromised participants. This paper presents a general technique for strengthening cryptographic protocols in order to satisfy authorization policies despite participant compromise. The central idea is to automatically transform the original cryptographic protocols by adding non-interactive zero-knowledge proofs.Each participant proves that the messages sent to the other participants are generated in accordance to the protocol.The zero-knowledge proofs are forwarded to ensure the correct behavior of all participants involved in the protocol, without revealing any secret data.We use an enhanced type system for zero-knowledge to verify that the transformed protocols conform to their authorization policy even if some participants are compromised.Finally, we developed a tool that automatically generates ML implementations of protocols based on zero-knowledge proofs.The protocol transformation, the verification, and the generation of protocol implementations are fully automated.Keywords
This publication has 20 references indexed in Scilit:
- Secure Implementations for Typed Session Abstractions20th IEEE Computer Security Foundations Symposium (CSF'07), 2007
- A Type Discipline for Authorization in Distributed Systems20th IEEE Computer Security Foundations Symposium (CSF'07), 2007
- Direct Anonymous Attestation (DAA): Ensuring Privacy with Corrupt AdministratorsPublished by Springer Nature ,2007
- Synthesizing Secure ProtocolsPublished by Springer Nature ,2007
- A derivation system and compositional logic for security protocolsJournal of Computer Security, 2005
- Foundations of CryptographyPublished by Cambridge University Press (CUP) ,2001
- Translation validation for an optimizing compilerACM SIGPLAN Notices, 2000
- Intersection types and bounded polymorphismMathematical Structures in Computer Science, 1997
- Reasoning about programs in continuation-passing styleHigher-Order and Symbolic Computation, 1993
- Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systemsJournal of the ACM, 1991