Deciding knowledge in security protocols under equational theories

被引:0
|
作者
Abadi, M [1 ]
Cortier, V
机构
[1] Univ Calif Santa Cruz, Comp Sci Dept, Santa Cruz, CA 95064 USA
[2] INRIA, Loria, Nancy, France
[3] CNRS, Nancy, France
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The analysis of security protocols requires precise formulations of the knowledge of protocol participants and attackers. In formal approaches, this knowledge is often treated in terms of message deducibility and indistinguishability relations. In this paper we study the decidability of these two relations. The messages in question may employ functions (encryption, decryption, etc.) axiomatized in an equational theory. Our main positive results say that, for a large and useful class of equational theories, deducibility and indistinguishability are both decidable in polynomial time.
引用
收藏
页码:46 / 58
页数:13
相关论文
共 50 条
  • [1] Deciding knowledge in security protocols under equational theories
    Abadi, Martin
    Cortier, Veronique
    [J]. THEORETICAL COMPUTER SCIENCE, 2006, 367 (1-2) : 2 - 32
  • [2] Deciding knowledge in security protocols under (many more) equational theories
    Abadi, M
    Cortier, W
    [J]. 18TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2005, : 62 - 76
  • [3] Deciding knowledge in security protocols for monoidal equational theories
    Cortier, Veronique
    Delaune, Stephanie
    [J]. LOGIC FOR PROGRAMMING, ARTIFICIAL INTELLIGENCE, AND REASONING, PROCEEDINGS, 2007, 4790 : 196 - +
  • [4] Computing Knowledge in Security Protocols Under Convergent Equational Theories
    Ciobaca, Stefan
    Delaune, Stephanie
    Kremer, Steve
    [J]. JOURNAL OF AUTOMATED REASONING, 2012, 48 (02) : 219 - 262
  • [5] Computing Knowledge in Security Protocols under Convergent Equational Theories
    Ciobaca, Stefan
    Delaune, Stephanie
    Kremer, Steve
    [J]. AUTOMATED DEDUCTION - CADE-22, 2009, 5663 : 355 - +
  • [6] Computing Knowledge in Security Protocols Under Convergent Equational Theories
    Ştefan Ciobâcă
    Stéphanie Delaune
    Steve Kremer
    [J]. Journal of Automated Reasoning, 2012, 48 : 219 - 262
  • [7] DECIDING KNOWLEDGE IN SECURITY PROTOCOLS UNDER SOME E-VOTING THEORIES
    Berrima, Mouhebeddine
    Ben Rajeb, Narjes
    Cortier, Veronique
    [J]. RAIRO-THEORETICAL INFORMATICS AND APPLICATIONS, 2011, 45 (03) : 269 - 299
  • [8] Combining algorithms for deciding knowledge in security protocols
    Arnaud, Mathilde
    Cortier, Veronique
    Delaune, Stephanie
    [J]. FRONTIERS OF COMBINING SYSTEMS, PROCEEDINGS, 2007, 4720 : 103 - +
  • [9] Deciding the word problem in the union of equational theories
    Baader, F
    Tinelli, C
    [J]. INFORMATION AND COMPUTATION, 2002, 178 (02) : 346 - 390
  • [10] A SYSTEM FOR DECIDING THE SECURITY OF CRYPTOGRAPHIC PROTOCOLS
    WATANABE, H
    FUJIWARA, T
    KASAMI, T
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1993, E76A (01) : 96 - 103