Modeling and verifying security protocols with the applied pi calculus and ProVerif

B Blanchet - Foundations and Trends® in Privacy and …, 2016 - nowpublishers.com
ProVerif is an automatic symbolic protocol verifier. It supports a wide range of cryptographic
primitives, defined by rewrite rules or by equations. It can prove various security properties …

Computational soundness of symbolic zero-knowledge proofs

M Backes, D Unruh - Journal of Computer Security, 2010 - content.iospress.com
The abstraction of cryptographic operations by term algebras, called Dolev–Yao models, is
essential in almost all tool-supported methods for proving security protocols. Recently …

[PDF][PDF] Toward Dynamic Epistemic Verification of Zero-Knowledge Protocols

G Costa, CP Brogi - 2024 - ceur-ws.org
We outline a novel approach for formally verifying zero-knowledge protocols building on
Dynamic Epistemic Logic (DEL) as an abstract semantics for a low-level protocol …

[PDF][PDF] Formalising zero-knowledge proofs in the symbolic model

S Fischlin - 2021 - ethz.ch
With most of our everyday life taking place online–from private conversations in messaging
applications to financial transactions even being published on a public ledger–security …

Computational soundness for Dalvik bytecode

M Backes, R Künnemann, E Mohammadi - Proceedings of the 2016 …, 2016 - dl.acm.org
Automatically analyzing information flow within Android applications that rely on
cryptographic operations with their computational security guarantees imposes formidable …

Union, intersection, and refinement types and reasoning about type disjointness for security protocol analysis

C Hritcu - 2012 - publikationen.sulb.uni-saarland.de
In this thesis we present two new type systems for verifying the security of cryptographic
protocol models expressed in a spi-calculus and, respectively, of protocol implementations …

[PDF][PDF] Epistemic Logics for Cryptographic Protocols and Zero-Knowledge Proofs

MC Jaramillo - 2021 - eprints.illc.uva.nl
This thesis presents an epistemic logic for modeling Zero-Knowledge proofs and other
cryptographic protocols. We consider multi-agent interactions where a prover convinces a …

Privacy enhancing technologies: protocol verification, implementation and specification

F Bendun - 2020 - publikationen.sulb.uni-saarland.de
In this thesis, we present novel methods for verifying, implementing and specifying protocols.
In particular, we focus properties modeling data protection and the protection of privacy. In …

Abstracting cryptographic protocols

E Mohammadi - 2014 - publikationen.sulb.uni-saarland.de
Cryptographic protocols can be used to harden the security of IT systems, but only if these
protocols are carefully woven into the system. Thus, a security analysis of the overall system …

[PDF][PDF] Security and Privacy by Declarative Design

MMKPM Reinert - scholar.archive.org
The privacy of users has rapidly become one of the most pervasive and stringent
requirements in distributed computing. Designing and implementing privacy-preserving …