Skip to Main content Skip to Navigation
Conference papers

Deciding knowledge in security protocols under (many more) equational theories

Martin Abadi Véronique Cortier 1
1 CASSIS - Combination of approaches to the security of infinite states systems
FEMTO-ST - Franche-Comté Électronique Mécanique, Thermique et Optique - Sciences et Technologies (UMR 6174), INRIA Lorraine, LORIA - Laboratoire Lorrain de Recherche en Informatique et ses Applications
Abstract : In the analysis of security protocols, the knowledge of attackers is often described in terms of message deducibility and indistinguishability relations. In this paper, we pursue the study of these two relations. We establish general decidability theorems for both. These theorems require only loose, abstract conditions on the equational theory for messages. They subsume previous results for a syntactically defined class of theories that allows basic equations for functions such as encryption, decryption, and digital signatures. They also apply to many other useful theories, for example with blind digital signatures, homomorphic encryption, XOR, and other associative-commutative functions.
Complete list of metadatas
Contributor : Véronique Cortier <>
Submitted on : Wednesday, November 2, 2005 - 2:49:12 PM
Last modification on : Tuesday, October 27, 2020 - 2:34:28 PM


  • HAL Id : inria-00000554, version 1


Martin Abadi, Véronique Cortier. Deciding knowledge in security protocols under (many more) equational theories. 18th IEEE Computer Security Foundations Workshop - CSFW'05, Jun 2005, Aix-en-Provence/France, pp.62-76. ⟨inria-00000554⟩



Record views