L–PEP: A Logic to Reason about Privacy–Enhancing Cryptography Protocols
In recent years, many cryptography protocols have been designed for many different scenarios, with the purpose of preserving security of communications as well as privacy and anonymity of participant entities. In general, every proposed solution has possed a real challenge to the existing formal methods of protocol analysis and verification. The main goal of this work is the proposal of a logic to reason about privacy-enhancing monotonic and non–monotonic cryptography protocols. The new logic will be called L-PEP and it extends the existing Rubin’s logic of beliefs.
KeywordsInference Rule Blind Signature Cryptographic Protocol Protocol Execution Cryptographic Hash Function
Unable to display preview. Download preview PDF.
- 1.Meadows, C.: Formal methods for cryptographic protocol analysis: emerging issues and trends. IEEE Journal on Selected Areas in Communications 21(1) (2003)Google Scholar
- 2.Privacy and identity management for europe (prime). Privacy and Identity Management for Europe (PRIME), https://www.prime-project.eu
- 5.Moser, L.: A logic of knowledge and belief for reasoning about computer security. In: Proceedings of the Computer Security Foundations Workshop II, pp. 57–63 (June 1989)Google Scholar
- 6.Rubin, A.D.: Nonmonotonic cryptographic protocols. In: Proceedings of the Computer Security Foundations Workshop, pp. 100–116 (1994)Google Scholar
- 8.Xu, Y., Xie, X.: Analysis of electronic commerce protocols based on extended rubin logic. In: Proceedings of the 9th International Conference for Young Computer Scientists, Washington, DC, USA, pp. 2079–2084. IEEE Computer Society, Los Alamitos (2008)Google Scholar
- 9.Xu, Y., Xie, X.: Analysis of authentication protocols based on rubin logic. In: 4th International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2008, pp. 1–5 (2008)Google Scholar
- 10.Xu, Y., Xie, X.: Security analysis of routing protocol for manet based on extended rubin logic. In: IEEE International Conference on Networking, Sensing and Control, ICNSC 2008, pp. 1326–1331 (2008)Google Scholar