{"id":"https://openalex.org/W4313040531","doi":"https://doi.org/10.1109/csf54842.2022.9919638","title":"Adversary Safety by Construction in a Language of Cryptographic Protocols","display_name":"Adversary Safety by Construction in a Language of Cryptographic Protocols","publication_year":2022,"publication_date":"2022-08-01","ids":{"openalex":"https://openalex.org/W4313040531","doi":"https://doi.org/10.1109/csf54842.2022.9919638"},"language":"en","primary_location":{"id":"doi:10.1109/csf54842.2022.9919638","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csf54842.2022.9919638","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE 35th Computer Security Foundations Symposium (CSF)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5003476534","display_name":"Timothy M. Braje","orcid":null},"institutions":[{"id":"https://openalex.org/I4210122954","display_name":"MIT Lincoln Laboratory","ror":"https://ror.org/022z6jk58","country_code":"US","type":"facility","lineage":["https://openalex.org/I4210122954","https://openalex.org/I63966007"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Timothy M. Braje","raw_affiliation_strings":["MIT Lincoln Laboratory,Lexington,MA,USA","MIT Lincoln Laboratory, Lexington, MA, USA"],"affiliations":[{"raw_affiliation_string":"MIT Lincoln Laboratory,Lexington,MA,USA","institution_ids":["https://openalex.org/I4210122954"]},{"raw_affiliation_string":"MIT Lincoln Laboratory, Lexington, MA, USA","institution_ids":["https://openalex.org/I4210122954"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101835433","display_name":"Alice Lee","orcid":"https://orcid.org/0009-0002-9197-1082"},"institutions":[{"id":"https://openalex.org/I145847075","display_name":"TU Wien","ror":"https://ror.org/04d836q62","country_code":"AT","type":"education","lineage":["https://openalex.org/I145847075"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Alice R. Lee","raw_affiliation_strings":["Technische Universit&#x00E4;t Wien,Vienna,Austria"],"affiliations":[{"raw_affiliation_string":"Technische Universit&#x00E4;t Wien,Vienna,Austria","institution_ids":["https://openalex.org/I145847075"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007268028","display_name":"Andrew Wagner","orcid":"https://orcid.org/0000-0002-9434-0780"},"institutions":[{"id":"https://openalex.org/I12912129","display_name":"Northeastern University","ror":"https://ror.org/04t5xt781","country_code":"US","type":"education","lineage":["https://openalex.org/I12912129"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Andrew Wagner","raw_affiliation_strings":["Northeastern University,Boston,MA,USA","Northeastern University, Boston, MA, USA"],"affiliations":[{"raw_affiliation_string":"Northeastern University,Boston,MA,USA","institution_ids":["https://openalex.org/I12912129"]},{"raw_affiliation_string":"Northeastern University, Boston, MA, USA","institution_ids":["https://openalex.org/I12912129"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069223655","display_name":"Benjamin Kaiser","orcid":"https://orcid.org/0000-0002-2011-6161"},"institutions":[{"id":"https://openalex.org/I20089843","display_name":"Princeton University","ror":"https://ror.org/00hx57361","country_code":"US","type":"education","lineage":["https://openalex.org/I20089843"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Benjamin Kaiser","raw_affiliation_strings":["Princeton University,Princeton,NJ,USA","Princeton University, Princeton, NJ, USA"],"affiliations":[{"raw_affiliation_string":"Princeton University,Princeton,NJ,USA","institution_ids":["https://openalex.org/I20089843"]},{"raw_affiliation_string":"Princeton University, Princeton, NJ, USA","institution_ids":["https://openalex.org/I20089843"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100613715","display_name":"Daniel Park","orcid":"https://orcid.org/0000-0002-1919-0460"},"institutions":[{"id":"https://openalex.org/I165799507","display_name":"Rensselaer Polytechnic Institute","ror":"https://ror.org/01rtyzb94","country_code":"US","type":"education","lineage":["https://openalex.org/I165799507"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Daniel Park","raw_affiliation_strings":["Rensselaer Polytechnic Institute,Troy,NY,USA","Rensselaer Polytechnic Institute, Troy, NY, USA"],"affiliations":[{"raw_affiliation_string":"Rensselaer Polytechnic Institute,Troy,NY,USA","institution_ids":["https://openalex.org/I165799507"]},{"raw_affiliation_string":"Rensselaer Polytechnic Institute, Troy, NY, USA","institution_ids":["https://openalex.org/I165799507"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024645142","display_name":"Martine Kalke","orcid":null},"institutions":[{"id":"https://openalex.org/I4210122954","display_name":"MIT Lincoln Laboratory","ror":"https://ror.org/022z6jk58","country_code":"US","type":"facility","lineage":["https://openalex.org/I4210122954","https://openalex.org/I63966007"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Martine Kalke","raw_affiliation_strings":["MIT Lincoln Laboratory,Lexington,MA,USA","MIT Lincoln Laboratory, Lexington, MA, USA"],"affiliations":[{"raw_affiliation_string":"MIT Lincoln Laboratory,Lexington,MA,USA","institution_ids":["https://openalex.org/I4210122954"]},{"raw_affiliation_string":"MIT Lincoln Laboratory, Lexington, MA, USA","institution_ids":["https://openalex.org/I4210122954"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047900373","display_name":"Robert K. Cunningham","orcid":"https://orcid.org/0000-0002-5837-6161"},"institutions":[{"id":"https://openalex.org/I170201317","display_name":"University of Pittsburgh","ror":"https://ror.org/01an3r305","country_code":"US","type":"education","lineage":["https://openalex.org/I170201317"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Robert K. Cunningham","raw_affiliation_strings":["University of Pittsburgh,Pittsburgh,PA,USA","University of Pittsburgh, Pittsburgh, PA, USA"],"affiliations":[{"raw_affiliation_string":"University of Pittsburgh,Pittsburgh,PA,USA","institution_ids":["https://openalex.org/I170201317"]},{"raw_affiliation_string":"University of Pittsburgh, Pittsburgh, PA, USA","institution_ids":["https://openalex.org/I170201317"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5078100439","display_name":"Adam Chlipala","orcid":"https://orcid.org/0000-0001-7085-9417"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Adam Chlipala","raw_affiliation_strings":["MIT CSAIL,Cambridge,MA,USA","MIT CSAIL, Cambridge, MA, USA"],"affiliations":[{"raw_affiliation_string":"MIT CSAIL,Cambridge,MA,USA","institution_ids":[]},{"raw_affiliation_string":"MIT CSAIL, Cambridge, MA, USA","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5003476534"],"corresponding_institution_ids":["https://openalex.org/I4210122954"],"apc_list":null,"apc_paid":null,"fwci":0.1381,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.50175584,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"33","issue":null,"first_page":"412","last_page":"427"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7908310294151306},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.6940945386886597},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.6770093441009521},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.6223293542861938},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5521987080574036},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5358409285545349},{"id":"https://openalex.org/keywords/universal-composability","display_name":"Universal composability","score":0.5351667404174805},{"id":"https://openalex.org/keywords/executable","display_name":"Executable","score":0.5307184457778931},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.504724383354187},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.5030307173728943},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.492917537689209},{"id":"https://openalex.org/keywords/mathematical-proof","display_name":"Mathematical proof","score":0.4594839811325073},{"id":"https://openalex.org/keywords/gas-meter-prover","display_name":"Gas meter prover","score":0.4553260803222656},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.43375518918037415},{"id":"https://openalex.org/keywords/semantics","display_name":"Semantics (computer science)","score":0.42204979062080383},{"id":"https://openalex.org/keywords/formal-methods","display_name":"Formal methods","score":0.4154619872570038},{"id":"https://openalex.org/keywords/formal-verification","display_name":"Formal verification","score":0.41528066992759705},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.38338518142700195},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.286312073469162},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.11614561080932617}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7908310294151306},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.6940945386886597},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.6770093441009521},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.6223293542861938},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5521987080574036},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5358409285545349},{"id":"https://openalex.org/C165751822","wikidata":"https://www.wikidata.org/wiki/Q7894118","display_name":"Universal composability","level":4,"score":0.5351667404174805},{"id":"https://openalex.org/C160145156","wikidata":"https://www.wikidata.org/wiki/Q778586","display_name":"Executable","level":2,"score":0.5307184457778931},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.504724383354187},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.5030307173728943},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.492917537689209},{"id":"https://openalex.org/C108710211","wikidata":"https://www.wikidata.org/wiki/Q11538","display_name":"Mathematical proof","level":2,"score":0.4594839811325073},{"id":"https://openalex.org/C159718280","wikidata":"https://www.wikidata.org/wiki/Q5526353","display_name":"Gas meter prover","level":3,"score":0.4553260803222656},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.43375518918037415},{"id":"https://openalex.org/C184337299","wikidata":"https://www.wikidata.org/wiki/Q1437428","display_name":"Semantics (computer science)","level":2,"score":0.42204979062080383},{"id":"https://openalex.org/C75606506","wikidata":"https://www.wikidata.org/wiki/Q1049183","display_name":"Formal methods","level":2,"score":0.4154619872570038},{"id":"https://openalex.org/C111498074","wikidata":"https://www.wikidata.org/wiki/Q173326","display_name":"Formal verification","level":2,"score":0.41528066992759705},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.38338518142700195},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.286312073469162},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.11614561080932617},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/csf54842.2022.9919638","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csf54842.2022.9919638","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE 35th Computer Security Foundations Symposium (CSF)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":44,"referenced_works":["https://openalex.org/W146244851","https://openalex.org/W1488058190","https://openalex.org/W1555936145","https://openalex.org/W1558518955","https://openalex.org/W1560201081","https://openalex.org/W1566393948","https://openalex.org/W1577049629","https://openalex.org/W1939647617","https://openalex.org/W1997440650","https://openalex.org/W2011086847","https://openalex.org/W2039875296","https://openalex.org/W2042923641","https://openalex.org/W2073742357","https://openalex.org/W2098588231","https://openalex.org/W2103289002","https://openalex.org/W2118870447","https://openalex.org/W2123991163","https://openalex.org/W2147758029","https://openalex.org/W2161011930","https://openalex.org/W2163005041","https://openalex.org/W2181293862","https://openalex.org/W2469403219","https://openalex.org/W2544274814","https://openalex.org/W2618267215","https://openalex.org/W2751465014","https://openalex.org/W2770556642","https://openalex.org/W2928036819","https://openalex.org/W3003637591","https://openalex.org/W3121396290","https://openalex.org/W3195831978","https://openalex.org/W4302408992","https://openalex.org/W4393100166","https://openalex.org/W6605925781","https://openalex.org/W6629297748","https://openalex.org/W6633410076","https://openalex.org/W6637054732","https://openalex.org/W6640592036","https://openalex.org/W6648273105","https://openalex.org/W6658387996","https://openalex.org/W6674711541","https://openalex.org/W6678143508","https://openalex.org/W6683828722","https://openalex.org/W6685359154","https://openalex.org/W6720167844"],"related_works":["https://openalex.org/W1554274402","https://openalex.org/W2102905434","https://openalex.org/W3130926090","https://openalex.org/W2029851387","https://openalex.org/W2114477748","https://openalex.org/W2160450576","https://openalex.org/W4211184092","https://openalex.org/W1805869620","https://openalex.org/W2104254650","https://openalex.org/W2353673984"],"abstract_inverted_index":{"Compared":[0],"to":[1,14,26],"ordinary":[2],"concurrent":[3],"and":[4,108,135,148],"distributed":[5],"systems,":[6],"cryptographic":[7],"protocols":[8,56,78],"are":[9],"distinguished":[10],"by":[11,18,68],"the":[12,106,119,125,131,136,145],"need":[13],"reason":[15],"about":[16,77],"interference":[17,67],"adversaries.":[19,71],"We":[20,104,139],"suggest":[21],"a":[22,45,73,92,98,141,151],"new":[23],"layered":[24],"approach":[25],"tame":[27],"that":[28,83],"complexity,":[29],"via":[30,150],"an":[31,40],"executable":[32],"protocol":[33],"language":[34,60],"whose":[35],"semantics":[36,120],"does":[37],"not":[38],"reveal":[39],"adversary":[41],"directly,":[42],"instead":[43],"enforcing":[44],"set":[46],"of":[47,53,91,97,110,121,144,153],"intuitive":[48],"hygiene":[49],"rules.":[50],"By":[51],"virtue":[52],"those":[54],"rules,":[55],"written":[57],"in":[58,130],"this":[59],"provably":[61],"behave":[62],"identically":[63],"with":[64,101],"or":[65],"without":[66],"active":[69],"Dolev-Yao-style":[70],"As":[72],"result,":[74],"formal":[75],"reasoning":[76],"can":[79,88],"be":[80],"simplified":[81],"enough":[82],"even":[84],"na\u00efve":[85],"model":[86],"checking":[87],"establish":[89],"correctness":[90],"multiparty":[93],"protocol,":[94],"through":[95],"analysis":[96],"state":[99],"space":[100],"no":[102],"adversary.":[103],"present":[105],"design":[107],"implementation":[109],"SPICY,":[111],"short":[112],"for":[113],"Secure":[114],"Protocols":[115],"Implemented":[116],"CorrectlY,":[117],"including":[118],"its":[122],"input":[123],"languages;":[124],"essential":[126],"safety":[127],"proofs,":[128],"formalized":[129],"Coq":[132],"theorem":[133],"prover;":[134],"automation":[137],"techniques.":[138],"provide":[140],"preliminary":[142],"evaluation":[143],"tool's":[146],"performance":[147],"capabilities":[149],"handful":[152],"case":[154],"studies.":[155]},"counts_by_year":[{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
