2005
DOI: 10.1007/978-3-540-32033-3_23
|View full text |Cite
|
Sign up to set email alerts
|

Intruder Deduction for AC-Like Equational Theories with Homomorphisms

Abstract: Abstract. Cryptographic protocols are small programs which involve a high level of concurrency and which are difficult to analyze by hand. The most successful methods to verify such protocols rely on rewriting techniques and automated deduction in order to implement or mimic the process calculus describing the protocol execution. We focus on the intruder deduction problem, that is the vulnerability to passive attacks, in presence of several variants of AC -like axioms (from AC to Abelian groups, including the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

5
44
0

Year Published

2005
2005
2020
2020

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 38 publications
(49 citation statements)
references
References 14 publications
5
44
0
Order By: Relevance
“…The following lemma says that if some intermediate marking has very high number of tokens in some place, then a suitable sub-word can be safely transfered without affecting the final marking reached or introducing negative number of tokens in any place, but reducing the maximum number of tokens accumulated in any intermediate marking. The proof is a simple consequence of [16,Lemma 42], which is about one-counter automata. An one-counter automaton is an automaton with a counter that can store natural numbers.…”
Section: Vertex Cover For Petri Netsmentioning
confidence: 99%
See 2 more Smart Citations
“…The following lemma says that if some intermediate marking has very high number of tokens in some place, then a suitable sub-word can be safely transfered without affecting the final marking reached or introducing negative number of tokens in any place, but reducing the maximum number of tokens accumulated in any intermediate marking. The proof is a simple consequence of [16,Lemma 42], which is about one-counter automata. An one-counter automaton is an automaton with a counter that can store natural numbers.…”
Section: Vertex Cover For Petri Netsmentioning
confidence: 99%
“…Apart from changing its state, the automaton can increment the counter, test it for zero and decrement it when not zero. It is proven in [16,Lemma 42] that if a one-counter automaton can reach from one of its configuration to another, it can do so without increasing the intermediate values of the counter by large numbers. A full proof of the following lemma is included in the Appendix for easy reference.…”
Section: Vertex Cover For Petri Netsmentioning
confidence: 99%
See 1 more Smart Citation
“…Hence several protocol decision procedures have been designed for handling equational properties [21,11,6,18] of the cryptographic primitives. A very fruitful concept in this area is the notion of locality introduced by McAllester [19] which applies to several intruder theories [12,18].…”
Section: Introductionmentioning
confidence: 99%
“…A very fruitful concept in this area is the notion of locality introduced by McAllester [19] which applies to several intruder theories [12,18]. When an intruder theory is local then we can restrict every intruder deduction to contain only subterms of its inputs, i.e.…”
Section: Introductionmentioning
confidence: 99%