计算机应用 ›› 2013, Vol. 33 ›› Issue (11): 3247-3251.

• 信息安全 • 上一篇    下一篇

关于秘密共享方案在应用Pi演算中的实现

徐军   

  1. 山东理工大学 计算机科学与技术学院,山东 淄博 255049
  • 收稿日期:2013-05-30 修回日期:2013-07-10 出版日期:2013-11-01 发布日期:2013-12-04
  • 通讯作者: 徐军
  • 作者简介:徐军(1967-),男,山东淄博人,副教授,硕士,主要研究方向:信息安全、并行计算。

About the secret sharing scheme applied in the Pi calculus

XU Jun   

  1. School of Computer Science and Technology, Shandong University of Technology, Zibo Shandong 255049, China
  • Received:2013-05-30 Revised:2013-07-10 Online:2013-12-04 Published:2013-11-01
  • Contact: XU Jun

摘要: 针对秘密共享方案的自动化验证问题,提出一种基于等值理论的秘密共享方案自动化验证方法。首先通过等值理论在应用Pi演算中对可验证的多秘密共享方案的密码学语义进行了形式化定义。在此基础上,进一步提出了一种用于将所提出等值理论转化为自动化协议验证器ProVerif中重写机制的编码方法,在ProVerif中实现了关于可验证的多秘密共享方案的自动化验证。通过证明给出了关于可验证的多秘密共享方案形式化分析结果的健壮性结论:如果自动化协议验证器ProVerif中可验证的多秘密共享方案的形式化分析结果满足特定安全属性,则其能够归约证明应用Pi演算模型中针对可验证的多秘密共享方案所建立的现实敌手可以“模拟”ProVerif验证器中的理想敌手,其意味着现实敌手与理想敌手是不可区分的。

关键词: Pi演算, 秘密共享, 形式化分析, 协议验证

Abstract: In this paper, an abstraction of secret-sharing schemes that is accessible to a fully mechanized analysis was given. This abstraction was formalized within the applied Pi-calculus by using an equational theory that characterized the cryptographic semantics of secret share. Based on that, an encoding method from the equational theory into a convergent rewriting system was presented, which was suitable for the automated protocol verifier ProVerif. Finally, the first general soundness result for verifiable multi-secret sharing schemes was concluded: for the multi-secret sharing schemes satisfying the specified security criterion in ProVerif, the realistic adversaries modeled on multi-secret sharing schemes in Pi-calculus can simulate the ideal adversaries in verifier ProVerif, which means that realistic adversaries and ideal adversaries are indistinguishable.

Key words: Pi-calculus, secret sharing, formal analysis, protocol verification

中图分类号: