Deciding knowledge in security protocols under (many more) equational theories

被引:14
作者
Abadi, M [1 ]
Cortier, W [1 ]
机构
[1] Univ Calif Santa Cruz, Dept Comp Sci, Santa Cruz, CA 95064 USA
来源
18TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS | 2005年
关键词
D O I
10.1109/CSFW.2005.14
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the analysis of security protocols, the knowledge of attackers is often described in terms of message deducibility and indistinguishability relations, In this paper we pursue the study of these two relations. We establish general decidability theorems for both. These theorems require only loose, abstract conditions on the equational theory for messages. They subsume previous results for a syntactically defined class of theories that allows basic equations for functions such as encryption, decryption, and digital signatures. They also apply to many other useful theories, for example with blind digital signatures, homomorphic encryption, XOR, and other associative-commutative functions.
引用
收藏
页码:62 / 76
页数:15
相关论文
共 20 条
[1]  
Abadi M, 2004, LECT NOTES COMPUT SC, V3142, P46
[2]   Reconciling two views of cryptography (The computational soundness of formal encryption) [J].
Abadi, M ;
Rogaway, P .
JOURNAL OF CRYPTOLOGY, 2002, 15 (02) :103-127
[3]   A calculus for cryptographic protocols: The spi calculus [J].
Abadi, M ;
Gordon, AD .
INFORMATION AND COMPUTATION, 1999, 148 (01) :1-70
[4]  
ABADI M, 2001, P 28 ACM S PRINC PRO, P104, DOI DOI 10.1145/373243.360213
[5]  
[Anonymous], 1996, LNCS
[6]  
BAUDET M, 2005, COMMUNICATION
[7]   An NP decision procedure for protocol insecurity with XOR [J].
Chevalier, Y ;
Küsters, R ;
Rusinowitch, M ;
Turuani, M .
18TH ANNUAL IEEE SYMPOSIUM ON LOGIC IN COMPUTER SCIENCE, PROCEEDINGS, 2003, :261-270
[8]  
Comon-Lundh H, 2004, LECT NOTES COMPUT SC, V2987, P1
[9]   Intruder deductions, constraint solving and insecurity decision in presence of exclusive or [J].
Comon-Lundh, H ;
Shmatikov, V .
18TH ANNUAL IEEE SYMPOSIUM ON LOGIC IN COMPUTER SCIENCE, PROCEEDINGS, 2003, :271-280
[10]  
COMONLUNDH H, 2003, LSV038 ENS CACH