|COOKIES: By using this website you agree that we can place Google Analytics Cookies on your device for performance monitoring.|
The IITM Model and its Application to the Analysis of Real-World Security Protocol
If you have a question about this talk, please contact Microsoft Research Cambridge Talks Admins.
This event may be recorded and made available internally or externally via http://research.microsoft.com. Microsoft will own the copyright of any recordings made. If you do not wish to have your image/voice recorded please consider this before attending
A prevalent way in cryptography to design and analyze cryptographic protocols in a modular way is the simulation-based approach. Higher-level components of a protocol are designed and analyzed based on lower-level idealized components, called ideal functionalities. Composition theorems then allow to replace the ideal functionalities by their realizations, altogether resulting in a system without idealized components.
In this talk, I first provide some background on the simulation-based approach and then briefly introduce the Inexhaustible Interactive Turing Machine (IITM) model, a model which, compared to other models for simulation-based security, is particularly simple and expressive. Although modularity is key to tame the complexity of real-world security protocol analysis, simulation-based approaches have rarely been used to analyze such protocols. In the past few years, we have developed a framework for the faithful and modular analysis of real-world security protocols based on the IITM model. I will present this framework and also discuss what has hindered the use of the simulation-based approach before.
This talk is part of the Microsoft Research Cambridge, public talks series.
This talk is included in these lists:
Note that ex-directory lists are not shown.
Other listsBP Lectures 2012 South Asia Film Series The Crisis of Democracy? Evidence from the Post-Communist World
Other talksProbing CP violation with neutrinos: the Long-Baseline Neutrino Facility and much more Beating Malaria 2015 From disease ecology to disease control: is elimination of rabies possible TBA Sea monsters to sonar: mapping the Polar oceans "On or about/In and upon": ‘dating statements’ and the rise of ‘almanac time’ in early modern England