2016
DOI: 10.1145/2926715
|View full text |Cite
|
Sign up to set email alerts
|

Automated Verification of Equivalence Properties of Cryptographic Protocols

Abstract: properties are essential in formal verification of cryptographic protocols. They are needed to model anonymity properties, strong versions of confidentiality, and resistance against offline guessing attacks. Indistinguishability properties can be conveniently modeled as equivalence properties. We present a novel procedure to verify equivalence properties for a bounded number of sessions of cryptographic protocols. As in the applied pi calculus, our protocol specification language is parametrized by a first-ord… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
119
0
3

Year Published

2017
2017
2020
2020

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 84 publications
(122 citation statements)
references
References 66 publications
(91 reference statements)
0
119
0
3
Order By: Relevance
“…Wang et al [2018] verify equivalence between a pair of programs that operate over databases with different schemas using bisimulation invariants over relational algebras with updates. Finally, automatically checking the equivalence of processes in a process calculus is an important building block for security protocol analysis [Blanchet et al 2008;Chadha et al 2016].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Wang et al [2018] verify equivalence between a pair of programs that operate over databases with different schemas using bisimulation invariants over relational algebras with updates. Finally, automatically checking the equivalence of processes in a process calculus is an important building block for security protocol analysis [Blanchet et al 2008;Chadha et al 2016].…”
Section: Related Workmentioning
confidence: 99%
“…Formally verifying relational properties has a broad range of practical applications. For instance, one might be interested in proving that the observable behaviors of two programs are related, showing for instance that the programs are equivalent [Blanchet et al 2008;Chadha et al 2016;Ştefan Ciobâcă et al 2016;Godlin and Strichman 2010;Hur et al 2012Hur et al , 2014Kundu et al 2009;Timany et al 2018;Wang et al 2018;Yang 2007], or that one refines the other [Timany and Birkedal 2019]. In other cases, one might be interested in relating two runs of a single program, but, as soon as the control flow can differ between the two runs, the compositional verification problem becomes the same as relating two different programs.…”
Section: Introductionmentioning
confidence: 99%
“…An example of algebraic properties may be the homomorphic property [37], [38] where {m 1 .m 2 } k is equivalent to {m 1 } k . {m 2 } k under the equational theory [34], [39], [40].…”
Section: Workmentioning
confidence: 99%
“…Numerous model checking-based tools have recently been proposed for the case of a bounded number of sessions, i.e., when protocols are executed a bounded number of times. These tools encompass SPEC [34], APTE [13,24], Akiss [23], or SAT-Equiv [28]. These tools vary in the class of cryptographic primitives and the class of protocols they can consider.…”
Section: Introductionmentioning
confidence: 99%