Abstract
The present column continues our excursion in cryptographic protocol analysis. Here Stephanie Delaune presents the exciting research challenges behind her recent ERC Starting Grant "POPSTAR: reasoning about physical properties of security protocols with an application to contactless systems". The overall research goal is to develop techniques and tools to analyse protocols that establish and rely on properties of the physical world, such as distance bounding protocols, contactless payment systems, etc. While the hope is to leverage the extraordinary results arising from years of research in cryptographic protocol analysis, formally characterizing physical properties in communication protocols is a fascinating challenge that demands novel solutions.
Recommendations
Security & privacy column
The present column is dedicated to cryptographic protocol analysis, a research field in which the synergy between logics and security has proven particularly fruitful, leading to the development of automated cryptographic protocol verifiers, which are ...
What Security Can We Achieve Within 4 Rounds?
AbstractKatz and Ostrovsky (Crypto 2004) proved that five rounds are necessary for stand-alone general black-box constructions of secure two-party protocols and at least four rounds are necessary if only one party needs to receive the output. Recently, ...
Security and Privacy Using One-Round Zero-Knowledge Proofs
CEC '05: Proceedings of the Seventh IEEE International Conference on E-Commerce TechnologyA zero-knowledge proof (ZKP) is an interactive proof that allows a prover to prove the knowledge of a secret to a verifier without revealing it. ZKPs are powerful tools to deal with critical applications in security e-commerce. Existing ZKPs are ...
Comments