2011
DOI: 10.1007/978-3-642-22438-6_6
|View full text |Cite
|
Sign up to set email alerts
|

Deciding Security for Protocols with Recursive Tests

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2011
2011
2018
2018

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 16 publications
0
7
0
Order By: Relevance
“…Indeed, we consider arbitrary cryptographic primitives (provided they can be expressed as terms) and arbitrary protocol transitions. For example, our model allows neighbourhood tests, recursive operations, and of course standard patternmatching, encompassing the models proposed in [25,7,8].…”
Section: Introductionmentioning
confidence: 99%
“…Indeed, we consider arbitrary cryptographic primitives (provided they can be expressed as terms) and arbitrary protocol transitions. For example, our model allows neighbourhood tests, recursive operations, and of course standard patternmatching, encompassing the models proposed in [25,7,8].…”
Section: Introductionmentioning
confidence: 99%
“…Such solutions often demand participation of system administrators during the verification phase, and require domain-specific expertise. The third aspect focuses on security properties, such as origin and route authenticity properties, in secure networking protocols that use cryptographic primitives [5,6,10,14,52].…”
Section: Related Workmentioning
confidence: 99%
“…More formally, for any trace tr of a process, if tr satisfies (2) and is such that there no distinct insertion for the same voter, that is:…”
Section: Verifiability Propertiesmentioning
confidence: 99%
“…In our ProVerif model we have considered an arbitrary number of options n, an arbitrary number of voters m, and several values for the number of selections k. To be able to cope with an arbitrary number of selections, we would need to handle lists of arbitrary size (representing the selection of a voter). While there are some preliminary results for protocols with lists [10,2,28], none of them can be applied to our symbolic mocel for the Neufchâtel protocol. This is why we consider several fixed values for k. The security properties together with corresponding the trust assumptions are summarized in Table 1 while the experiments are presented in Table 2.…”
Section: So Proving the Equivalencementioning
confidence: 99%