Dolev-Yao Theory with Associative Blindpair Operators

被引:0
|
作者
Baskar, A. [1 ]
Ramanujam, R. [2 ]
Suresh, S. P. [3 ,4 ]
机构
[1] BITS Pilani, K K Birla Goa Campus, Goa, India
[2] Inst Math Sci, Chennai, Tamil Nadu, India
[3] ReLaX, UMI 2000, CNRS, Chennai, Tamil Nadu, India
[4] CMI, Chennai, Tamil Nadu, India
关键词
SECURITY PROTOCOLS; KNOWLEDGE; INSECURITY;
D O I
10.1007/978-3-030-23679-3_5
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In the context of modeling cryptographic tools like blind signatures and homomorphic encryption, the Dolev-Yao model is typically extended with an operator over which encryption is distributive. The intruder deduction problem has a non-elementary upper bound when the extended operator is an Abelian group operator. Here we show that the intruder deduction problem is DEXPTIME-complete when we restrict the operator to satisfy only the associative property. We propose an automata-based analysis for the upper bound and use the reachability problem for alternating pushdown systems to show the lower bound.
引用
收藏
页码:58 / 69
页数:12
相关论文
共 50 条
  • [21] An extension of typed MSR for specifying esoteric protocols and their Dolev-Yao intruder
    Balopoulos, T
    Gritzalis, S
    Katsikas, SK
    [J]. COMMUNICATIONS AND MULTIMEDIA SECURITY, 2005, 175 : 209 - 221
  • [22] A cryptographically sound Dolev-Yao style security proof of an electronic payment system
    Backes, M
    Dürmuth, M
    [J]. 18TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2005, : 78 - 93
  • [23] Formalization in PVS of Balancing Properties Necessary for Proving Security of the Dolev-Yao Cascade Protocol Model
    Rego, Yuri Santos
    Ayala-Rincon, Mauricio
    [J]. JOURNAL OF FORMALIZED REASONING, 2013, 6 (01): : 31 - 61
  • [24] A cryptographically sound Dolev-Yao style security proof of the Otway-Rees protocol
    Backes, M
    [J]. COMPUTER SECURITY ESORICS 2004, PROCEEDINGS, 2004, 3193 : 89 - 108
  • [25] Dolev-Yao攻击者模型的形式化描述
    唐郑熠
    李祥
    [J]. 计算机工程与科学, 2010, 32 (08) : 36 - 38
  • [26] A structured operational semantic modelling of the Dolev-Yao threat environment and its composition with cryptographic protocols
    Mao, W
    [J]. COMPUTER STANDARDS & INTERFACES, 2005, 27 (05) : 479 - 488
  • [27] Security Analysis of a Key Exchange Protocol under Dolev-Yao Threat Model Using Tamarin Prover
    Ram, Singam Bhargav
    Odelu, Vanga
    [J]. 2022 IEEE 12TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2022, : 667 - 672
  • [28] Limits of the cryptographic realization of Dolev-Yao-style XOR
    Backes, M
    Pfitzmann, B
    [J]. COMPUTER SECURITY - ESORICS 2005, PROCEEDINGS, 2005, 3679 : 178 - 196
  • [29] Limits of the BRSIM/UC soundness of Dolev-Yao-style XOR
    Backes, Michael
    Pfitzmann, Birgit
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2008, 7 (01) : 33 - 54
  • [30] Limits of the BRSIM/UC soundness of Dolev–Yao-style XOR
    Michael Backes
    Birgit Pfitzmann
    [J]. International Journal of Information Security, 2008, 7 : 33 - 54