Dolev-Yao Theory with Associative Blindpair Operators

被引:0
|
作者
Baskar, A. [1 ]
Ramanujam, R. [2 ]
Suresh, S. P. [3 ,4 ]
机构
[1] BITS Pilani, K K Birla Goa Campus, Goa, India
[2] Inst Math Sci, Chennai, Tamil Nadu, India
[3] ReLaX, UMI 2000, CNRS, Chennai, Tamil Nadu, India
[4] CMI, Chennai, Tamil Nadu, India
关键词
SECURITY PROTOCOLS; KNOWLEDGE; INSECURITY;
D O I
10.1007/978-3-030-23679-3_5
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In the context of modeling cryptographic tools like blind signatures and homomorphic encryption, the Dolev-Yao model is typically extended with an operator over which encryption is distributive. The intruder deduction problem has a non-elementary upper bound when the extended operator is an Abelian group operator. Here we show that the intruder deduction problem is DEXPTIME-complete when we restrict the operator to satisfy only the associative property. We propose an automata-based analysis for the upper bound and use the reachability problem for alternating pushdown systems to show the lower bound.
引用
收藏
页码:58 / 69
页数:12
相关论文
共 50 条
  • [1] Extending Dolev-Yao with Assertions
    Ramanujam, R.
    Sundararajan, Vaishnavi
    Suresh, S. P.
    [J]. INFORMATION SYSTEMS SECURITY (ICISS 2014), 2014, 8880 : 50 - 68
  • [2] Satisfiability of Dolev-Yao Constraints
    Mazare, Laurent
    [J]. ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2005, 125 (01) : 109 - 124
  • [3] A computational interpretation of Dolev-Yao adversaries
    Herzog, J
    [J]. THEORETICAL COMPUTER SCIENCE, 2005, 340 (01) : 57 - 81
  • [4] A DEXPTIME-Complete Dolev-Yao Theory with Distributive Encryption
    Baskar, A.
    Ramanujam, R.
    Suresh, S. P.
    [J]. MATHEMATICAL FOUNDATIONS OF COMPUTER SCIENCE 2010, 2010, 6281 : 102 - +
  • [5] A Dolev-Yao Model for Zero Knowledge
    Baskar, Anguraj
    Ramanujam, R.
    Suresh, S. P.
    [J]. ADVANCES IN COMPUTER SCIENCE - ASIAN 2009: INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2009, 5913 : 137 - +
  • [6] Decision and Complexity of Dolev-Yao Hyperproperties
    Rakotonirina, Itsaka
    Barthe, Gilles
    Schneidewind, Clara
    [J]. PROCEEDINGS OF THE ACM ON PROGRAMMING LANGUAGES-PACMPL, 2024, 8 (POPL):
  • [7] A structured operational modelling of the Dolev-Yao threat model
    Mao, WB
    [J]. SECURITY PROTOCOLS, 2004, 2845 : 34 - 44
  • [8] Bounded memory Dolev-Yao adversaries in collaborative systems
    Kanovich, Max
    Kirigin, Tajana Ban
    Nigam, Vivek
    Scedrov, Andre
    [J]. INFORMATION AND COMPUTATION, 2014, 238 : 233 - 261
  • [9] Bounded Memory Dolev-Yao Adversaries in Collaborative Systems
    Kanovich, Max
    Kirigin, Tajana Ban
    Nigam, Vivek
    Scedrov, Andre
    [J]. FORMAL ASPECTS OF SECURITY AND TRUST, 2011, 6561 : 18 - +
  • [10] Flow logic for Dolev-Yao secrecy in cryptographic processes
    Bodei, C
    Degano, P
    Nielson, F
    Nielson, HR
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2002, 18 (06): : 747 - 756