2012
DOI: 10.1007/978-3-642-28869-2_6
|View full text |Cite
|
Sign up to set email alerts
|

Automated Verification of Equivalence Properties of Cryptographic Protocols

Abstract: Abstract. Indistinguishability properties are essential in formal verification of cryptographic protocols. They are needed to model anonymity properties, strong versions of confidentiality and resistance to offline guessing attacks, and can be conveniently modeled using process equivalences. We present a novel procedure to verify equivalence properties for bounded number of sessions. Our procedure is able to verify trace equivalence for determinate cryptographic protocols. On determinate protocols, trace equiv… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
52
0

Year Published

2012
2012
2018
2018

Publication Types

Select...
5
2

Relationship

2
5

Authors

Journals

citations
Cited by 52 publications
(52 citation statements)
references
References 38 publications
(80 reference statements)
0
52
0
Order By: Relevance
“…First, we wish to lift the restriction of subterm convergent equational theories. Even though the problem becomes quickly undecidable for more general rewrite theories, we plan to design a partially correct, i.e., sound, complete, but not necessarily terminating, procedure, as the procedure underlying the Akiss tool [CCCK16]. Second, we plan to avoid the restriction to destructor rewrite systems to more general ones.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…First, we wish to lift the restriction of subterm convergent equational theories. Even though the problem becomes quickly undecidable for more general rewrite theories, we plan to design a partially correct, i.e., sound, complete, but not necessarily terminating, procedure, as the procedure underlying the Akiss tool [CCCK16]. Second, we plan to avoid the restriction to destructor rewrite systems to more general ones.…”
Section: Discussionmentioning
confidence: 99%
“…The Apte tool [Che14] covers the same primitives but allows else branches and decides trace equivalence exactly. On the contrary, the Akiss tool [CCCK16] allows for user-defined cryptographic primitives. Partial correctness of Akiss is shown for primitives modelled by an arbitrary convergent rewrite system that has the finite variant property [CD05].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…AKiSs supports a larger variety of cryptographic primitives than ProVerif and the current version of the Inductive Method. In (Chadha et al, 2012), Chadha et al conjecture that all those which can be modelled in a rewrite system with a specific convergence property are supported. Notably, trapdoor commitments can be modelled.…”
Section: Discussionmentioning
confidence: 99%
“…In (Chadha et al, 2012), a new cryptographic process calculus is introduced alongside a novel procedure for checking equivalence. Specifically, under-and overapproximations of ≈ t are introduced, the fine-grained trace equivalence ≈ f t and the coarse trace equivalence ≈ ct .…”
Section: Proverifmentioning
confidence: 99%