Stateful protocol composition in Isabelle/HOL

AV Hess, SA Mödersheim, AD Brucker - ACM Transactions on Privacy …, 2023 - dl.acm.org
Communication networks like the Internet form a large distributed system where a huge
number of components run in parallel, such as security protocols and distributed web …

Stateful protocol composition

AV Hess, SA Mödersheim, AD Brucker - European Symposium on …, 2018 - Springer
We prove a parallel compositionality result for protocols with a shared mutable state, ie,
stateful protocols. For protocols satisfying certain compositionality conditions our result …

Lower bounds and impossibility results for concurrent self composition

Y Lindell - Journal of Cryptology, 2008 - Springer
In the setting of concurrent self composition, a single protocol is executed many times
concurrently in a network. In this paper, we prove lower bounds and impossibility results for …

Secure composition of protocols

V Cortier - Theory of Security and Applications: Joint Workshop …, 2012 - Springer
Security protocols are small distributed programs that are designed to ensure security over
untrusted networks such as the Internet. They are notoriously dificult to design and flaws can …

Stateful protocol composition and typing

AV Hess, SA Mödersheim, AD Brucker - Archive of Formal Proofs, 2020 - orbit.dtu.dk
We provide in this AFP entry several relative soundness results for security protocols. In
particular, we prove typing and compositionality results for stateful protocols (ie, protocols …

On the protocol composition logic PCL

C Cremers - Proceedings of the 2008 ACM symposium on …, 2008 - dl.acm.org
A recent development in formal security protocol analysis is the Protocol Composition Logic
(PCL). We identify a number of problems with this logic as well as with extensions of the …

Lower bounds for concurrent self composition

Y Lindell - Theory of Cryptography Conference, 2004 - Springer
In the setting of concurrent self composition, a single protocol is executed many times
concurrently by a single set of parties. In this paper, we prove that there exist many …

A derivation system and compositional logic for security protocols

A Datta, A Derek, JC Mitchell… - Journal of Computer …, 2005 - content.iospress.com
Many authentication and key exchange protocols are built using an accepted set of standard
concepts such as Diffie–Hellman key exchange, nonces to avoid replay, certificates from an …

Compositionality of security protocols: A research agenda

C Cremers - Electronic Notes in Theoretical Computer Science, 2006 - Elsevier
The application of formal methods to security protocol analysis has been extensively
researched during the last 25 years. Several formalisms and (semi-) automatic tools for the …

Information-theoretically secure protocols and security under composition

E Kushilevitz, Y Lindell, T Rabin - Proceedings of the thirty-eighth annual …, 2006 - dl.acm.org
We investigate the question of whether security of protocols in the information-theoretic
setting (where the adversary is computationally unbounded) implies security under …