Deciding knowledge in security protocols under equational theories

被引:99
作者
Abadi, Martin
Cortier, Veronique
机构
[1] Loria CNRS, F-54506 Vandoeuvre Les Nancy, France
[2] INRIA, Lorraine Project Cassis, F-54506 Vandoeuvre Les Nancy, France
[3] Univ Calif Santa Cruz, Dept Comp Sci, Santa Cruz, CA 95064 USA
[4] Microsoft Res, Silicon Valley, CA USA
基金
美国国家科学基金会;
关键词
cryptography; decidability;
D O I
10.1016/j.tcs.2006.08.032
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The analysis of security protocols requires precise formulations of the knowledge of protocol participants and attackers. In formal approaches, this knowledge is often treated in terms of message deducibility and indistinguishability relations. In this paper we study the decidability of these two relations. The messages in question may employ functions (encryption, decryption, etc.) axiomatized in an equational theory. One of our main positive results says that deducibility and indistinguishability are both decidable in polynomial time for a large class of equational theories. This class of equational theories is defined syntactically and includes, for example, theories for encryption, decryption, and digital signatures. We also establish general decidability theorems for an even larger class of theories. These theorems require only loose, abstract conditions, and apply to many other useful theories, for example with blind digital signatures, homomorphic encryption, XOR, and other associative-commutative functions. (c) 2006 Elsevier B.V. All rights reserved.
引用
收藏
页码:2 / 32
页数:31
相关论文
共 33 条
  • [1] Deciding knowledge in security protocols under (many more) equational theories
    Abadi, M
    Cortier, W
    [J]. 18TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2005, : 62 - 76
  • [2] Abadi M, 2004, LECT NOTES COMPUT SC, V3142, P46
  • [3] A calculus for cryptographic protocols: The spi calculus
    Abadi, M
    Gordon, AD
    [J]. INFORMATION AND COMPUTATION, 1999, 148 (01) : 1 - 70
  • [4] Abadi M., 1998, Nordic Journal of Computing, V5, P267
  • [5] ABADI M, 2001, P 28 ACM S PRINC PRO, P104, DOI DOI 10.1145/373243.360213
  • [6] [Anonymous], 1996, LNCS
  • [7] Baudet M, 2005, LECT NOTES COMPUT SC, V3580, P652
  • [8] Baudet M., 2005, PROC ACM C COMPUTER, P16
  • [9] BAUDET M, 2005, COMMUNICATION
  • [10] Blanchet B, 2005, IEEE S LOG, P331