2005
DOI: 10.3233/jcs-2005-13106
|View full text |Cite
|
Sign up to set email alerts
|

Decidability of context-explicit security protocols

Abstract: An important problem in the analysis of security protocols is that of checking whether a protocol preserves secrecy, i.e., no secret owned by the honest agents is unintentionally revealed to the intruder. This problem has been proved to be undecidable in several settings. In particular, [11] prove the undecidability of the secrecy problem in the presence of an unbounded set of nonces, even when the message length is bounded. In this paper we prove that even in the presence of an unbounded set of nonces the sec… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
19
0

Year Published

2005
2005
2015
2015

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 32 publications
(19 citation statements)
references
References 21 publications
0
19
0
Order By: Relevance
“…Under some additional assumptions (e.g. no temporary secret, no ciphertext forwarding), several decidability results [24,21] have been obtained by showing that it is sufficient to consider one session per role. But those results can not deal with protocols such as the Yahalom protocol or protocols which rely on a temporary secret.…”
Section: Other Ways Of Taggingmentioning
confidence: 99%
See 1 more Smart Citation
“…Under some additional assumptions (e.g. no temporary secret, no ciphertext forwarding), several decidability results [24,21] have been obtained by showing that it is sufficient to consider one session per role. But those results can not deal with protocols such as the Yahalom protocol or protocols which rely on a temporary secret.…”
Section: Other Ways Of Taggingmentioning
confidence: 99%
“…An early result is the PTIME complexity result by Dolev et al [15] for a restricted class, called ping-pong protocols. Other classes have been proposed by Ramanujam and Suresh [23,24], and Lowe [21]. However, in both cases, temporary secrets, composed keys and ciphertext forwarding are not allowed which discards protocols, such as the Yahalom protocol [7] (see also Section 4.3).…”
Section: Introductionmentioning
confidence: 99%
“…The basic concept behind EV-Freedom [Mil03], PEV-Freedom [LM05], EVXFreedom, and Structure is the same: Protocols should be designed so that agents will be able to verify some property of messages after decryption, such as their number in the protocol, operators used to create them etc. This is a prudent engineering practice [AN94], has been used to guarantee protocol security against important forms of attacks [HLS03, GT00, ML09, Mal10] and ensure decidability [Low99,RS05].…”
Section: Resultsmentioning
confidence: 99%
“…The main advantage of this approach is its relative simplicity which makes it amenable to automated analysis. For example, the secrecy preservation is co-NP-complete for a bounded number of sessions [Amadio and Lugiez 2000;Rusinowitch and Turuani 2001], and decidable for an unbounded number of sessions under some additional restrictions [Comon-Lundh and Cortier 2003;Durgin et al 1999;Lowe 1998;Ramanujam and Suresh 2005]. Many tools have also been developed to automatically verify cryptographic protocols, like [Armando et al 2005;Blanchet 2001;Millen and Shmatikov 2001;Cremers 2008].…”
Section: Introductionmentioning
confidence: 99%