Satisfiability of Dolev-Yao Constraints

被引:1
|
作者
Mazare, Laurent [1 ]
机构
[1] Lab VERIMAG, Grenoble, France
关键词
Security; Formal Verification; Dolev-Yao Constraints; Rewriting Systems; Opacity;
D O I
10.1016/j.entcs.2004.05.022
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The secrecy problem, under certain hypothesis, is equivalent to satisfiability of constraints involving Dolev-Yao's operator vertical bar. Making some restrictions over these constraints, their satisfiability has been proven to be NP-complete. However, to check opacity [11] or some modified versions of secrecy, there is a need to find similar results for a larger class of predicates. This paper starts to extend this decidability result to more general constraints allowing in particular inequalities and gives a simple decision procedure based on a rewriting system.
引用
收藏
页码:109 / 124
页数:16
相关论文
共 50 条
  • [1] Extending Dolev-Yao with Assertions
    Ramanujam, R.
    Sundararajan, Vaishnavi
    Suresh, S. P.
    [J]. INFORMATION SYSTEMS SECURITY (ICISS 2014), 2014, 8880 : 50 - 68
  • [2] A computational interpretation of Dolev-Yao adversaries
    Herzog, J
    [J]. THEORETICAL COMPUTER SCIENCE, 2005, 340 (01) : 57 - 81
  • [3] A Dolev-Yao Model for Zero Knowledge
    Baskar, Anguraj
    Ramanujam, R.
    Suresh, S. P.
    [J]. ADVANCES IN COMPUTER SCIENCE - ASIAN 2009: INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2009, 5913 : 137 - +
  • [4] Decision and Complexity of Dolev-Yao Hyperproperties
    Rakotonirina, Itsaka
    Barthe, Gilles
    Schneidewind, Clara
    [J]. PROCEEDINGS OF THE ACM ON PROGRAMMING LANGUAGES-PACMPL, 2024, 8 (POPL):
  • [5] Dolev-Yao Theory with Associative Blindpair Operators
    Baskar, A.
    Ramanujam, R.
    Suresh, S. P.
    [J]. IMPLEMENTATION AND APPLICATION OF AUTOMATA (CIAA 2019), 2019, 11601 : 58 - 69
  • [6] A structured operational modelling of the Dolev-Yao threat model
    Mao, WB
    [J]. SECURITY PROTOCOLS, 2004, 2845 : 34 - 44
  • [7] Bounded memory Dolev-Yao adversaries in collaborative systems
    Kanovich, Max
    Kirigin, Tajana Ban
    Nigam, Vivek
    Scedrov, Andre
    [J]. INFORMATION AND COMPUTATION, 2014, 238 : 233 - 261
  • [8] Bounded Memory Dolev-Yao Adversaries in Collaborative Systems
    Kanovich, Max
    Kirigin, Tajana Ban
    Nigam, Vivek
    Scedrov, Andre
    [J]. FORMAL ASPECTS OF SECURITY AND TRUST, 2011, 6561 : 18 - +
  • [9] Flow logic for Dolev-Yao secrecy in cryptographic processes
    Bodei, C
    Degano, P
    Nielson, F
    Nielson, HR
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2002, 18 (06): : 747 - 756
  • [10] Justifying a Dolev-Yao model under active attacks
    Backes, M
    Pfitzmann, B
    Waidner, M
    [J]. FOUNDATIONS OF SECURITY ANALYSIS AND DESIGN III, 2005, 3655 : 1 - 41