2004
DOI: 10.1007/978-3-540-27836-8_7
|View full text |Cite
|
Sign up to set email alerts
|

Deciding Knowledge in Security Protocols Under Equational Theories

Abstract: Abstract. The analysis of security protocols requires precise formulations of the knowledge of protocol participants and attackers. In formal approaches, this knowledge is often treated in terms of message deducibility and indistinguishability relations. In this paper we study the decidability of these two relations. The messages in question may employ functions (encryption, decryption, etc.) axiomatized in an equational theory. Our main positive results say that, for a large and useful class of equational the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
239
1

Year Published

2005
2005
2018
2018

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 88 publications
(241 citation statements)
references
References 21 publications
1
239
1
Order By: Relevance
“…While many complexity results are known for trace properties [DLM04,RT03], the case of behavioural equivalences remains mostly open. When the attacker is an eavesdropper and cannot interact with the protocol, the indistinguishability problem-static equivalence-has been shown ptime for large classes of cryptographic primitives [AC06,CDK12,CBC10]. For active attackers, bounding the number of protocol sessions is often sufficient to obtain decidability [RT03] and is of practical interest: most real-life attacks indeed only require a small number of sessions.…”
Section: Related Workmentioning
confidence: 99%
See 4 more Smart Citations
“…While many complexity results are known for trace properties [DLM04,RT03], the case of behavioural equivalences remains mostly open. When the attacker is an eavesdropper and cannot interact with the protocol, the indistinguishability problem-static equivalence-has been shown ptime for large classes of cryptographic primitives [AC06,CDK12,CBC10]. For active attackers, bounding the number of protocol sessions is often sufficient to obtain decidability [RT03] and is of practical interest: most real-life attacks indeed only require a small number of sessions.…”
Section: Related Workmentioning
confidence: 99%
“…This notion has been extensively studied (see e.g. [AC06]). Intuitively, two frames are in static equivalence if an attacker cannot distinguish them, even when applying arbitrary primitives to the messages in the frames.…”
Section: Static Equivalencementioning
confidence: 99%
See 3 more Smart Citations