Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security 2019
DOI: 10.1145/3319535.3354260
|View full text |Cite
|
Sign up to set email alerts
|

Exploiting Symmetries When Proving Equivalence Properties for Security Protocols

Abstract: Verification of privacy-type properties for cryptographic protocols in an active adversarial environment, modelled as a behavioural equivalence in concurrent-process calculi, exhibits a high computational complexity. While undecidable in general, for some classes of common cryptographic primitives the problem is coNEXP-complete when the number of honest participants is bounded.In this paper we develop optimisation techniques for verifying equivalences, exploiting symmetries between the two processes under stud… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
11
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
1
1

Relationship

2
3

Authors

Journals

citations
Cited by 8 publications
(11 citation statements)
references
References 27 publications
0
11
0
Order By: Relevance
“…QUESTION: Are the two processes equivalent by session? Surprisingly, despite practical improvements by order of magnitudes of the verification time compared to trace equivalence [24], this performance gap is not reflected in the theoretical, worst-case complexity. The same reduction as trace equivalence can indeed be used to prove equivalence by session coNEXP-hard.…”
Section: Question: Are the Two Processes Diff Equivalent?mentioning
confidence: 97%
See 4 more Smart Citations
“…QUESTION: Are the two processes equivalent by session? Surprisingly, despite practical improvements by order of magnitudes of the verification time compared to trace equivalence [24], this performance gap is not reflected in the theoretical, worst-case complexity. The same reduction as trace equivalence can indeed be used to prove equivalence by session coNEXP-hard.…”
Section: Question: Are the Two Processes Diff Equivalent?mentioning
confidence: 97%
“…Equivalence by session. We also briefly mention another equivalence, between diffequivalence and trace equivalence (but incomparable with labelled bisimilarity) [24]. Known as equivalence by session, it was originally presented as a sound proof technique for trace equivalence in the bounded fragment, that was inducing less false attacks than diff-equivalence.…”
Section: Question: Are the Two Processes Diff Equivalent?mentioning
confidence: 99%
See 3 more Smart Citations