2008
DOI: 10.1007/978-3-540-89439-1_9
|View full text |Cite
|
Sign up to set email alerts
|

From One Session to Many: Dynamic Tags for Security Protocols

Abstract: Abstract. The design and verification of cryptographic protocols is a notoriously difficult task, even in abstract Dolev-Yao models. This is mainly due to several sources of unboundedness (size of messages, number of sessions, . . . ). In this paper, we characterize a class of protocols for which secrecy for an unbounded number of sessions is decidable. More precisely, we present a simple transformation which maps a protocol that is secure for a single protocol session (a decidable problem) to a protocol that … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
12
0

Year Published

2008
2008
2022
2022

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 18 publications
(13 citation statements)
references
References 22 publications
1
12
0
Order By: Relevance
“…For instance [43] assumes that any two distinct terms headed with encryption, that occur in the protocol, are not unifiable. A similar result is shown in [6] for another class of protocols. However, in both cases, only secrecy is considered and the simple intruder deduction system is the one of example 1 (for symmetric and asymmetric encryption).…”
Section: Related Worksupporting
confidence: 84%
“…For instance [43] assumes that any two distinct terms headed with encryption, that occur in the protocol, are not unifiable. A similar result is shown in [6] for another class of protocols. However, in both cases, only secrecy is considered and the simple intruder deduction system is the one of example 1 (for symmetric and asymmetric encryption).…”
Section: Related Worksupporting
confidence: 84%
“…First, we have message terms as we have them in AnB, with the same convention that constants start with a lower-case letter and variables with an upper-case letter. 4 On top of that, we have facts, which are built using distinguished function symbols and have message terms as arguments. For instance, iknows(m) denotes the fact that the intruder knows the message m, and state R (m 1 , .…”
Section: Ifmentioning
confidence: 99%
“…[1,2,4,5,6,13,15,18,20,21,24,25,27,29,37,43,49,51,53,59,61,62,63]. The Open Source Fixed-point Model Checker OFMC, the successor of the On-theFly Model-Checker [12,54,58], is a freely available 1 tool that integrates the most successful techniques of this field.…”
Section: Introductionmentioning
confidence: 99%
“…Some researchers have adopted a systematic approach designed to capture specific security requirements by using privacy models (e.g., [Paise and Vaudenay 2008;Juels and Weis 2009;Michahelles et al 2007;Avoine et al 2007]; computational models (e.g., [Vaudenay 2007]); or symbolic models (e.g., [Arapinis et al 2008]). In this article we propose to use a formal specifications-based framework that captures these models and addresses composability issues.…”
Section: Introductionmentioning
confidence: 99%