Advanced Search

Browse by Discipline

Scientific Societies

E-print Alerts

Add E-prints

E-print Network

  Advanced Search  

Computational Secrecy by Typing for the Pi Calculus Martin Abadi1,2

Summary: Computational Secrecy by Typing for the Pi Calculus
Mart´in Abadi1,2
, Ricardo Corin1,3
, and C´edric Fournet1
Microsoft Research
University of California, Santa Cruz
University of Twente
Abstract. We define and study a distributed cryptographic implementation for
an asynchronous pi calculus. At the source level, we adapt simple type systems
designed for establishing formal secrecy properties. We show that those secrecy
properties have counterparts in the implementation, not formally but at the level
of bitstrings, and with respect to probabilistic polynomial-time active adversaries.
We rely on compilation to a typed intermediate language with a fixed scheduling
strategy. While we exploit interesting, previous theorems for that intermediate
language, our result appears to be the first computational soundness theorem for
a standard process calculus with mobile channels.
1 Introduction


Source: Abadi, Martín - Department of Computer Science, University of California at Santa Cruz


Collections: Computer Technologies and Information Sciences