Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Ajith Ramanathan is active.

Publication


Featured researches published by Ajith Ramanathan.


foundations of software science and computation structure | 2004

Probabilistic Bisimulation and Equivalence for Security Analysis of Network Protocols

Ajith Ramanathan; John C. Mitchell; Andre Scedrov; Vanessa Teague

Using a probabilistic polynomial-time process calculus designed for specifying security properties as observational equivalences, we develop a form of bisimulation that justifies an equational proof system. This proof system is sufficiently powerful to derive the semantic security of El Gamal encryption from the Decision Diffie-Hellman (DDH) assumption. The proof system can also derive the converse: if El Gamal is secure, then DDH holds. While these are not new cryptographic results, these example proofs show the power of probabilistic bisimulation and equational reasoning for protocol security.


Journal of Cryptology | 2008

On the Relationships between Notions of Simulation-Based Security

Ralf Küsters; Anupam Datta; John C. Mitchell; Ajith Ramanathan

Several compositional forms of simulation-based security have been proposed in the literature, including Universal Composability, Black-Box Simulatability, and variants thereof. These relations between a protocol and an ideal functionality are similar enough that they can be ordered from strongest to weakest according to the logical form of their definitions. However, determining whether two relations are in fact identical depends on some subtle features that have not been brought out in previous studies. We identify two main factors: the position of a “master process” in the distributed system and some limitations on transparent message forwarding within computational complexity bounds. Using a general computational framework, called Sequential Probabilistic Process Calculus (SPPC), we clarify the relationships between the simulation-based security conditions. Many of the proofs are carried out based on a small set of equivalence principles involving processes and distributed systems. These equivalences exhibit the essential properties needed to prove relationships between security notions and allow us to carry over our results to those computational models which satisfy these equivalences.


Electronic Notes in Theoretical Computer Science | 2001

A Probabilistic Polynomial-time Calculus For Analysis of Cryptographic Protocols: (Preliminary Report)

John C. Mitchell; Ajith Ramanathan; Andre Scedrov; Vanessa Teague

We prove properties of a process calculus that is designed for an- alyzing security protocols. Our long-term goal is to develop a form of protocol analysis, consistent with standard cryptographic assumptions, that provides a language for expressing probabilistic polynomial-time protocol steps, a spec- iflcation method based on a compositional form of equivalence, and a logical basis for reasoning about equivalence. The process calculus is a variant of CCS, with bounded replication and probabilistic polynomial-time expressions allowed in messages and boolean tests. To avoid inconsistency between security and nondeterminism, messages are scheduled probabilistically instead of nondeterministically. We prove that evaluation of any process expression halts in probabilistic polynomial time and deflne a form of asymptotic protocol equivalence that allows security proper- ties to be expressed using observational equivalence, a standard relation from programming language theory that involves quantifying over possible environ- ments that might interact with the protocol. We develop a form of probabilistic bisimulation and use it to establish the soundness of an equational proof system based on observational equivalences. The proof system is illustrated by a formation derivation of the assertion, well-known in cryptography, that ElGamal encryptions semantic security is equivalent to the (computational) Decision Di-e-Hellman assumption. This example demonstrates the power of probabilistic bisimulation and equational reasoning for protocol security.


theory of cryptography conference | 2005

On the relationships between notions of simulation-based security

Anupam Datta; Ralf Küsters; John C. Mitchell; Ajith Ramanathan

Several compositional forms of simulation-based security have been proposed in the literature, including universal composability, black-box simulatability, and variants thereof. These relations between a protocol and an ideal functionality are similar enough that they can be ordered from strongest to weakest according to the logical form of their definitions. However, determining whether two relations are in fact identical depends on some subtle features that have not been brought out in previous studies. We identify the position of a “master process” in the distributed system, and some limitations on transparent message forwarding within computational complexity bounds, as two main factors. Using a general computational framework, we clarify the relationships between the simulation-based security conditions.


theory of cryptography conference | 2006

Games and the impossibility of realizable ideal functionality

Anupam Datta; Ante Derek; John C. Mitchell; Ajith Ramanathan; Andre Scedrov

A cryptographic primitive or a security mechanism can be specified in a variety of ways, such as a condition involving a game against an attacker, construction of an ideal functionality, or a list of properties that must hold in the face of attack. While game conditions are widely used, an ideal functionality is appealing because a mechanism that is indistinguishable from an ideal functionality is therefore guaranteed secure in any larger system that uses it. We relate ideal functionalities to games by defining the set of ideal functionalities associated with a game condition and show that under this definition, which reflects accepted use and known examples, bit commitment, a form of group signatures, and some other cryptographic concepts do not have any realizable ideal functionality.


logic in computer science | 2001

Probabilistic polynomial-time process calculus and security protocol analysis

John C. Mitchell; Ajith Ramanathan; Andre Scedrov; Vanessa Teague

Abstract: We describe properties of a process calculus that has been developed for the purpose of analyzing security protocols. The process calculus is a restricted form of p-calculus, with bounded replication and probabilistic polynomial-time expressions allowed in messages and boolean tests. To avoid problems expressing security in the presence of nondeterminism, messages are scheduled probabilistically instead of nondeterministically. We prove that evaluation may be completed in probabilistic polynomial time and develop properties of a form of asymptotic protocol equivalence that allows security to be speci£ed using observational equivalence, a standard relation from programming language theory that involves quantifying over possible environments that might interact with the protocol. We also relate process equivalence to cryptographic concepts such as pseudorandom number generators and polynomial-time statistical tests.


Archive | 2005

A Probabilistic Polynomial-Time Process Calculus for the Analysis of Cryptographic Protocols

John C. Mitchell; Ajith Ramanathan; Andre Scedrov; Vanessa Teague


Electronic Notes in Theoretical Computer Science | 2001

A Probabilistic Polynomial-time Calculus For Analysis of Cryptographic Protocols

John C. Mitchell; Ajith Ramanathan; Andre Scedrov; Vanessa Teague


workshop on information technologies and systems | 2004

Unifying Equivalence-Based Definitions of Protocol Security

Anupam Datta; Ralf Küsters; John C. Mitchell; Ajith Ramanathan; Vitaly Shmatikov


IACR Cryptology ePrint Archive | 2006

On the Relationships Between Notions of Simulation-Based Security.

Anupam Datta; Ralf Küsters; John C. Mitchell; Ajith Ramanathan

Collaboration


Dive into the Ajith Ramanathan's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Andre Scedrov

University of Pennsylvania

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Anupam Datta

Carnegie Mellon University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge