(2021) Accountability in the Decentralised-Adversary Setting.
|
Text
accountability-conf.pdf Download (474kB) | Preview |
Abstract
A promising paradigm in protocol design is to hold parties accountable for misbehavior, instead of postulating that they are trustworthy. Recent approaches in defining this property, called accountability, characterized malicious behavior as a deviation from the protocol that causes a violation of the desired security property, but did so under the assumption that all deviating parties are controlled by a single, centralized adversary. In this work, we investigate the setting where multiple parties can deviate with or without coordination in a variant of the applied-π calculus. We first demonstrate that, under realistic assumptions, it is impossible to determine all misbehaving parties; however, we show that accountability can be relaxed to exclude causal dependencies that arise from the behavior of deviating parties, and not from the protocol as specified. We map out the design space for the relaxation, point out protocol classes separating these notions and define conditions under which we can guarantee fairness and completeness. Most importantly, we discover under which circumstances it is correct to consider accountability in the single-adversary setting, where this property can be verified with off-the-shelf protocol verification tools.
Item Type: | Conference or Workshop Item (A Paper) (Paper) |
---|---|
Additional Information: | accepted |
Divisions: | Robert Künnemann (RK) |
Conference: | CSF IEEE Computer Security Foundations Symposium (was CSFW) |
Depositing User: | Robert Künnemann |
Date Deposited: | 03 Dec 2020 10:17 |
Last Modified: | 03 Dec 2020 10:17 |
Primary Research Area: | NRA2: Reliable Security Guarantees |
URI: | https://publications.cispa.saarland/id/eprint/3308 |
Actions
Actions (login required)
View Item |