It is a common practice to design a protocol (say Q) assuming some secure channels. Then the secure channels are implemented using any standard protocol, e.g. TLS. In this paper, we study when such a practice is indeed secure. We provide a characterization of both confidential and authenticated channels. As an application, we study several protocols of the literature including TLS and BAC protocols. Thanks to our result, we can consider a larger number of sessions when analyzing complex protocols resulting from explicit implementation of the secure channels of some more abstract protocol Q.
@InProceedings{cheval_et_al:LIPIcs.FSTTCS.2015.575, author = {Cheval, Vincent and Cortier, V\'{e}ronique and le Morvan, Eric}, title = {{Secure Refinements of Communication Channels}}, booktitle = {35th IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS 2015)}, pages = {575--589}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-939897-97-2}, ISSN = {1868-8969}, year = {2015}, volume = {45}, editor = {Harsha, Prahladh and Ramalingam, G.}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.FSTTCS.2015.575}, URN = {urn:nbn:de:0030-drops-56583}, doi = {10.4230/LIPIcs.FSTTCS.2015.575}, annote = {Keywords: Protocol, Composition, Formal methods, Channels, Implementation} }
Feedback for Dagstuhl Publishing