[FOM] DIMACS Workshop on Security Analysis of Protocols
Andre Scedrov
scedrov at saul.cis.upenn.edu
Sun May 16 22:16:46 EDT 2004
DIMACS Workshop on Security Analysis of Protocols
June 7 - 9, 2004
DIMACS Center, CoRE Building, Rutgers University, Piscataway, NJ
Organizers:
John Mitchell, Stanford, mitchell at cs.stanford.edu
Ran Canetti, IBM Watson, canetti at watson.ibm.com
Presented under the auspices of the Special Focus on Communication Security
and Information Privacy.
http://dimacs.rutgers.edu/Workshops/Protocols/
The analysis of cryptographic protocols is a fundamental and challenging area
of network security research. Traditionally, there have been two main
approaches. One is the logic approach aimed at developing automated tools for
the formal verification of protocols. The other is the computational or
complexity-theoretic approach that characterizes protocol security as a set of
computational tasks and proves protocol security via reduction to the strength
of the underlying cryptographic functions. Although these two lines of work
share a common goal, there has been little commonality between them until the
last year or two.
The goal of this workshop is to promote work on security analysis of protocols
and provide a forum for cooperative research combining the logical and
complexity-based approaches.
The workshop will include tutorials on the basics of each approach and will
allow researchers from both communities to talk about their current work.
------------------------
Tentative Schedule
------------------------
Monday June 7
9:00 Welcome
9:30 Tutorial Peter Ryan: Formal methods and protocol analysis
10:30 Break
11:00 Session
Nancy Lynch:
Modeling security protocols using I/O automata
Thomas Wilke:
Automata-based analysis of recursive cryptographic protocols
Carl A. Gunter
Formal Analysis of Availability
12:30 Lunch
2:00 Tutorial Daniele Micciancio: Towards cryptographically sound
formal
analysis
3:00 Break
3:30 Session
Birgit Pfitzmann:
A Reactively Secure Dolev-Yao-style Cryptographic Library
Jan Jürjens:
Automated Computationally Faithful Verification of Cryptoprotocols:
Applying and Extending the Abadi-Rogaway-Jürjens Approach
Jonathan Herzog:
Universally Composable Symbolic Analysis of Cryptographic Protocols
5:00 Reception Wine and cheeese at DIMACS
Tuesday June 8
9:30 Tutorial Yehuda Lindell: On composability of cryptographic
protocols
10:30 Break
11:00 Session
Manoj Prabhakaran and Amit Sahai:
New Notions of Security: Achieving Universal Composability without
Trusted
Setup
Dominic Mayers:
Universal Composability With Priced Ideal Protocols
Andre Scedrov:
A probabilistic polynomial-time calculus for the analysis of
cryptographic protocols
12:30 Lunch
2:00 Tutorial Joshua D. Guttman: Proving protocol properties
3:00 Break
3:30 Session
Sabrina Tarento:
Machine-Checked Formalization of the Generic Model and the Random Oracle
Model
M. Petrocchi:
A Framework for Security Analysis with Team Automata
Ralf Kuesters:
Sequential Process Calculus and Machine Models for Simulation-based
Security
Gergely Bana:
Computational and Information-Theoretic Soundness
and Completeness of the Expanded Logics of Formal Encryption
5:30 End of session
19:30 Banquet dinner (location TBA)
Wednesday June 9
9:30 Tutorial: Bruce Kapron: Formal representions of polynomial-time
algorithms and security
10:30 Break
11:00 Session
Silvio Micali:
Collusion-Free Protocols
Juan Garay:
A Framework for Fair (Multi-Party) Computation
Olivier Pereira and Jean-Jacques Quisquater:
Dolev-Yao-type Abstraction of Modular Exponentiation - the Cliques Case
Study
12:30 Lunch
1:30 Tutorial: Vitaly Shmatikov: Constraint-based methods:
Adding computational properties to symbolic models
2:30 Break
2:45 Session
Cathy Meadows:
Towards a Hierarchy of Cryptographic Protocol Model
Angelo Trolina:
Message Equivalent and Imperfect Cryptography in a Formal Model
Christopher Lynch:
Sound Approximations to Diffie-Hellman Using Rewrite Rules
Iliano Cervesato:
Fine-Grained MSR Specifications for Quantitative Security Analysis
4:45 End
=============================================================================
More information about the FOM
mailing list