Team Comète

Overall Objectives
Scientific Foundations
Application Domains
New Results
Other Grants and Activities

Section: New Results

A Framework for analyzing probabilistic protocols

Probabilistic security protocols involve probabilistic choices and are used for many purposes including signing contracts, sending certified email and protecting the anonymity of communication agents. Some probabilistic protocols rely on specific random primitives such as the Oblivious Transfer [84] . There are various examples in this category, notably the contract signing protocol in [58] and the privacy-preserving auction protocol in [73] .

A large effort has been dedicated to the formal verification of security protocols, and several approaches based on process-calculi techniques have been proposed. However, in the particular case of probabilistic protocols, only few attempts of this kind have been made. One proposal of this kind is [36] , which defines a probabilistic version of the noninterference property, and uses a probabilistic variant of CCS and of bisimulation to analyze protocols wrt this property.

In [50] and [12] we have developed a framework for analyzing probabilistic security protocols using a probabilistic extension of the $ \pi$ -calculus inspired by the work in [63] , [80] . In order to express security properties in this calculus, we have extended the notion of testing equivalence [78] to the probabilistic setting. We have have applied these techniques to verify the Partial Secret Exchange, a protocol which uses a randomized primitive, the Oblivious Transfer, to achieve fairness of information exchange between two parties.


Logo Inria