skip to main content
10.1145/1180337.1180341acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

Secure information flow with random assignment and encryption

Published: 03 November 2006 Publication History

Abstract

Type systems for secure information flow aim to prevent a program from leaking information from variables classified as $H$ to variables classified as $L$. In this work we extend such a type system to address encryption and decryption; our intuition is that encrypting a $H$ plaintext yields a $L$ ciphertext. We argue that well-typed, polynomial-time programs in our system satisfy a computational probabilistic noninterference property, provided that the encryption scheme is IND-CCA secure. As a part of our proof, we first consider secure information flow in a language with a random assignment operator (but no encryption). We establish a result that may be of independent interest, namely, that well-typed, probabilistically total programs with random assignments satisfy probabilistic noninterference. We establish this result using a weak probabilistic bisimulation.

References

[1]
M. Abadi and P. Rogaway. Reconciling two views of cryptography (The computational soundness of formal encryption). In TCS '00: Proceedings of the IFIP International Conference on Theoretical Computer Science, pages 3--22, Aug. 2000.]]
[2]
A. Askarov and A. Sabelfeld. Security-typed languages for implementation of cryptographic protocols: A case study. In Proceedings of the 10th European Symposium on Research in Computer Security (ESORICS 2005), pages 197--221, Sept. 2005.]]
[3]
M. Backes and B. Pfitzmann. Computational probabilistic noninterference. In Proceeding 7th ESORICS, pages 1--23, 2002.]]
[4]
M. Backes and B. Pfitzmann. Relating symbolic and cryptographic secrecy. In Proceeding 26th IEEE Symposium on Security and Privacy, Oakland, California, 2005.]]
[5]
M. Bellare, E. Desai, E. Jokipii, and P. Rogaway. A concrete security treatment of symmetric encryption: Analysis of DES modes of operation. In Proceedings of the 38th Symposium on Foundations of Computer Science, 1997.]]
[6]
M. Bellare and P. Rogaway. Introduction to modern cryptography. At http://www-cse.ucsd.edu/ users/mihir/cse207/classnotes.html, 2005.]]
[7]
D. Clark, S. Hunt, and P. Malacaria. Quantitative analysis of the leakage of confidential data. Electronic Notes in Theoretical Computer Science, 59(3), 2001.]]
[8]
D. Denning and P. Denning. Certification of programs for secure information flow. Commun. ACM, 20(7):504--513, 1977.]]
[9]
A. Di Pierro, C. Hankin, and H. Wiklicky. Approximate non-interference. In Proceedings 15th IEEE Computer Security Foundations Workshop, pages 1--17, Cape Breton, Nova Scotia, Canada, June 2002.]]
[10]
W. Feller. An Introduction to Probability Theory and Its Applications, volume I. John Wiley & Sons, Inc., Third edition, 1968.]]
[11]
B. Jonsson and K. Larsen. Specification and refinement of probabilistic processes. In Proc. 6th IEEE Symposium on Logic in Computer Science, pages 266--277, 1991.]]
[12]
M. H. Kang and I. S. Moskowitz. A pump for rapid, reliable secure communication. In Proceedings of the 1st ACM Conference on Computer & Communications Security, pages 119--129, Nov. 1993.]]
[13]
P. Laud. Semantics and program analysis of computationally secure information flow. In Proceedings 10th ESOP (European Symposium on Programming, pages 77--91, 2001.]]
[14]
P. Laud. Handling encryption in an analysis for secure information flow. In Proceedings 12th ESOP (European Symposium on Programming, pages 159--173, 2003.]]
[15]
P. Laud. Secrecy types for a simulatable cryptographic library. In Proceedings 12th CCS (ACM Conference on Computer and Communications Security), pages 26--35, 2005.]]
[16]
P. Laud and V. Vene. A type system for computationally secure information flow. In Proceedings of the 15th International Symposium on Fundamentals of Computational Theory, volume 3623 of Lecture Notes in Computer Science, pages 365--377, Lübeck, Germany, 2005.]]
[17]
P. Li and S. Zdancewic. Downgrading policies and relaxed noninterference. In Proceedings 32nd Symposium on Principles of Programming Languages, pages 158--170, Jan. 2005.]]
[18]
A. C. Myers, S. Chong, N. Nystrom, L. Zheng, and S. Zdancewic. Jif: Java + information flow. Cornell University, 2004. Available at http://www.cs.cornell.edu/jif/.]]
[19]
A. Sabelfeld and A. C. Myers. Language-based information flow security. IEEE Journal on Selected Areas in Communications, 21(1):5--19, Jan. 2003.]]
[20]
A. Sabelfeld and D. Sands. Dimensions and principles of declassification. In Proceedings 18th IEEE Computer Security Foundations Workshop, June 2005.]]
[21]
G. Smith. A new type system for secure information flow. In Proceedings 14th IEEE Computer Security Foundations Workshop, pages 115--125, Cape Breton, Nova Scotia, Canada, June 2001.]]
[22]
G. Smith. Probabilistic noninterference through weak probabilistic bisimulation. In Proceedings 16th IEEE Computer Security Foundations Workshop, pages 3--13, Pacific Grove, California, June 2003.]]
[23]
D. Volpano. Secure introduction of one-way functions. In Proceedings 13th IEEE Computer Security Foundations Workshop, pages 246--254, Cambridge, UK, June 2000.]]
[24]
D. Volpano, G. Smith, and C. Irvine. A sound type system for secure flow analysis. Journal of Computer Security, 4(2,3):167--187, 1996.]]
[25]
B. Warinschi. A computational analysis of the Needham-Schroeder-(Lowe) protocol. In Proceedings 16th IEEE Computer Security Foundations Workshop, pages 248--262, Pacific Grove, California, June 2003.]]

Cited By

View all
  • (2023)Verifying Indistinguishability of Privacy-Preserving ProtocolsProceedings of the ACM on Programming Languages10.1145/36228497:OOPSLA2(1442-1469)Online publication date: 16-Oct-2023
  • (2020)RIFJournal of Computer Security10.3233/JCS-19131628:2(191-228)Online publication date: 1-Jan-2020
  • (2019)A language for probabilistically oblivious computationProceedings of the ACM on Programming Languages10.1145/33711184:POPL(1-31)Online publication date: 20-Dec-2019
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
FMSE '06: Proceedings of the fourth ACM workshop on Formal methods in security
November 2006
84 pages
ISBN:1595935509
DOI:10.1145/1180337
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 03 November 2006

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. IND-CCA
  2. IND-CPA
  3. encryption
  4. noninterference
  5. reductions
  6. secure information flow
  7. type systems

Qualifiers

  • Article

Conference

CCS06
Sponsor:

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)8
  • Downloads (Last 6 weeks)0
Reflects downloads up to 08 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2023)Verifying Indistinguishability of Privacy-Preserving ProtocolsProceedings of the ACM on Programming Languages10.1145/36228497:OOPSLA2(1442-1469)Online publication date: 16-Oct-2023
  • (2020)RIFJournal of Computer Security10.3233/JCS-19131628:2(191-228)Online publication date: 1-Jan-2020
  • (2019)A language for probabilistically oblivious computationProceedings of the ACM on Programming Languages10.1145/33711184:POPL(1-31)Online publication date: 20-Dec-2019
  • (2017)Cryptographically Secure Information Flow Control on Key-Value StoresProceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security10.1145/3133956.3134036(1893-1907)Online publication date: 30-Oct-2017
  • (2012)Automatically Verified Mechanized Proof of One-Encryption Key ExchangeProceedings of the 2012 IEEE 25th Computer Security Foundations Symposium10.1109/CSF.2012.8(325-339)Online publication date: 25-Jun-2012
  • (2012)Security protocol verificationProceedings of the First international conference on Principles of Security and Trust10.1007/978-3-642-28641-4_2(3-29)Online publication date: 24-Mar-2012
  • (2011)Information-flow types for homomorphic encryptionsProceedings of the 18th ACM conference on Computer and communications security10.1145/2046707.2046747(351-360)Online publication date: 17-Oct-2011
  • (2011)AuraConfProceedings of the 7th ACM SIGPLAN workshop on Types in language design and implementation10.1145/1929553.1929563(45-58)Online publication date: 25-Jan-2011
  • (2011)A Survey of Symbolic Methods in Computational Analysis of Cryptographic SystemsJournal of Automated Reasoning10.1007/s10817-010-9187-946:3-4(225-259)Online publication date: 1-Apr-2011
  • (2009)A user interface for a game-based protocol verification toolProceedings of the 6th international conference on Formal Aspects in Security and Trust10.1007/978-3-642-12459-4_19(263-278)Online publication date: 5-Nov-2009
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media