You are looking at a specific version 20080622:140011 of this paper. See the latest version.

Paper 2006/398

The Layered Games Framework for Specifications and Analysis of Security Protocols

Amir Herzberg and Igal Yoffe

Abstract

We establish rigorous foundations to the use of modular, layered design for building complex distributed systems. Layering is key to the design of the Internet and other distributed systems, hence such solid, theoretical foundations are essential, especially when considering adversarial settings, such as for security and cryptographic protocols. We define the basic concepts for modular, layered design: protocols, systems, configurations, executions, and models, and three relations: indistinguishability (between two systems), satisfaction (of a model by a system), and realization (by protocol, of one model over another model). We prove several basic properties, including the {\em layering lemma} and the {\em indistinguishability lemma}. The indistinguishability lemma shows that if two systems \Gamma_L, \Gamma_R are indistinguishable, and \Gamma_L satisfies some model M, then \Gamma_R also satisfies M. The layering lemma shows that given protocols {\pi_i}^u_{i=1}, if every protocol \pi_i realizes model M_i over model M_{i-1}, then the composite protocol \pi_{1||...||u} realizes model M_u over M_0. This allows specification, design and analysis of each layer independently, and combining the results to ensure properties of the complete system. Our framework is based on {\em games}, following many works in applied cryptography. This differs from existing frameworks allowing compositions of cryptographic protocols, based on {\em simulatability of ideal functionality}. Game-based models are more general and flexible than ideal functionality specifications, supporting different adversarial models and avoiding over-specification, which is essential for practical distributed systems and networks.

Note: This is draft of full version; extended abstract (with some errors) will appear in proc. of TCC'08.

Metadata
Available format(s)
PDF
Category
Foundations
Publication info
Published elsewhere. This is draft of full version; extended abstract (with some errors) will appear in proc. of TCC'08.
Keywords
Layered specificationssecure e-commerce layerscomposability.
Contact author(s)
amir herzberg @ gmail com
History
2008-06-22: last of 12 revisions
2006-11-12: received
See all versions
Short URL
https://ia.cr/2006/398
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.