2012
DOI: 10.1007/978-3-642-28641-4_10
|View full text |Cite
|
Sign up to set email alerts
|

Reduction of Equational Theories for Verification of Trace Equivalence: Re-encryption, Associativity and Commutativity

Abstract: Abstract. Verification of trace equivalence is difficult to automate in general because it requires relating two infinite sets of traces. The problem becomes even more complex when algebraic properties of cryptographic primitives are taken in account in the formal model. For example, no verification tool or technique can currently handle automatically a realistic model of re-encryption or associative-commutative operators. In this setting, we propose a general technique for reducing the set of traces that have… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2014
2014
2017
2017

Publication Types

Select...
3
1
1

Relationship

2
3

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 33 publications
0
6
0
Order By: Relevance
“…More recently, theoretical foundations have been provided for this technique and soundness of this extension has been proved [82]. A reduction result to get rid of some particular equations (that cannot be handled by the ProVerif tool) has been devised in [83]. Relying on it, a first automated proof of privacy for the protocol Prêtà Voter (that uses re-encryption and associative/commutative operators) has been carried out with success.…”
Section: Procedures For Checking Diff-equivalencementioning
confidence: 99%
“…More recently, theoretical foundations have been provided for this technique and soundness of this extension has been proved [82]. A reduction result to get rid of some particular equations (that cannot be handled by the ProVerif tool) has been devised in [83]. Relying on it, a first automated proof of privacy for the protocol Prêtà Voter (that uses re-encryption and associative/commutative operators) has been carried out with success.…”
Section: Procedures For Checking Diff-equivalencementioning
confidence: 99%
“…In [22] and respectively [2], it is shown how to handle an unbounded number of Diffie-Hellman exponentiations and respectively reencryptions in ProVerif. Surprisingly, the underlying associative-commutative properties of Diffie-Hellman help in [22], while [2] can rely on the fact that a re-encryption does not change the semantics of a ciphertext. Another case where an unbounded number of operations is problematic is file sharing [8].…”
Section: Related Workmentioning
confidence: 99%
“…Some techniques and tools [7,8,9,10] for indistinguishability properties have recently been developed to automatically check indistinguishability properties and some of them can handle part of the primitives needed in e-voting. For example, ProVerif and Akiss have both been successfully applied to analyse some voting protocols [5,10,11,12,13,14]. However, a third source of difficulty is the fact that voting systems are typically parametrized by the number of voters: both the bulletin board and the tally processes have to process as many ballots as they receive.…”
Section: Introductionmentioning
confidence: 99%
“…SPEC [8], Akiss [10], and APTE [9]) can only handle a finite number of sessions. So case studies have to consider a finite number of voters [10,12,13,14] unless proofs are conducted by hand [13,15].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation