Hiding Names: Private Authentication in the Applied Pi Calculus

We present the analysis of a protocol for private authentication in the applied pi calculus. We treat authenticity and secrecy properties of the protocol. Although such properties are fairly standard, their formulation in the applied pi calculus makes an original use of process equivalences. In addition, we treat identity-protection properties, which are a delicate concern in several recent protocol designs.

[1]  G. Tsudik,et al.  Authentication of mobile users , 1994, IEEE Network.

[2]  Roger M. Needham,et al.  Using encryption for authentication in large networks of computers , 1978, CACM.

[3]  Martín Abadi,et al.  Mobile values, new names, and secure communication , 2001, POPL '01.

[4]  Hugo Krawczyk,et al.  SKEME: a versatile secure key exchange mechanism for Internet , 1996, Proceedings of Internet Society Symposium on Network and Distributed Systems Security.

[5]  Hugo Krawczyk,et al.  Untraceable mobility or how to travel incognito , 1999, Comput. Networks.

[6]  Martín Abadi,et al.  Secure implementation of channel abstractions , 1998, Proceedings. Thirteenth Annual IEEE Symposium on Logic in Computer Science (Cat. No.98CB36226).

[7]  Martín Abadi,et al.  Authentication primitives and their compilation , 2000, POPL '00.

[8]  Angelos D. Keromytis,et al.  Efficient, DoS-resistant, secure key exchange for internet protocols , 2001, CCS '02.

[9]  Angelos D. Keromytis,et al.  Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols , 2001, Security Protocols Workshop.

[10]  Paul F. Syverson,et al.  Protocols Using Anonymous Connections: Mobile Applications , 1997, Security Protocols Workshop.

[11]  Markus Jakobsson,et al.  Security Weaknesses in Bluetooth , 2001, CT-RSA.

[12]  G. Tsudik,et al.  Traveling Incognito , 1998 .

[13]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[14]  B. Lampson,et al.  Authentication in distributed systems: theory and practice , 1991, TOCS.

[15]  Gene Tsudik,et al.  Authentication of Mobile Users A new set of inter-domain security mechanisms is needed for users to venture into remote domains while inheriting privileges from their home domains. , 1994 .

[16]  Hannes Federrath,et al.  MIXes in Mobile Communication Systems: Location Management with Privacy , 1996, Information Hiding.

[17]  N. Asokan,et al.  Untraceability in mobile networks , 1995, MobiCom '95.