Deciding knowledge in security protocols under (many more) equational theories

Martin Abadi Véronique Cortier 1
1 CASSIS - Combination of approaches to the security of infinite states systems
FEMTO-ST - Franche-Comté Électronique Mécanique, Thermique et Optique - Sciences et Technologies (UMR 6174), INRIA Lorraine, LORIA - Laboratoire Lorrain de Recherche en Informatique et ses Applications
Abstract : In the analysis of security protocols, the knowledge of attackers is often described in terms of message deducibility and indistinguishability relations. In this paper, we pursue the study of these two relations. We establish general decidability theorems for both. These theorems require only loose, abstract conditions on the equational theory for messages. They subsume previous results for a syntactically defined class of theories that allows basic equations for functions such as encryption, decryption, and digital signatures. They also apply to many other useful theories, for example with blind digital signatures, homomorphic encryption, XOR, and other associative-commutative functions.
Complete list of metadatas

https://hal.inria.fr/inria-00000554
Contributor : Véronique Cortier <>
Submitted on : Wednesday, November 2, 2005 - 2:49:12 PM
Last modification on : Friday, July 6, 2018 - 3:06:10 PM

Identifiers

  • HAL Id : inria-00000554, version 1

Citation

Martin Abadi, Véronique Cortier. Deciding knowledge in security protocols under (many more) equational theories. 18th IEEE Computer Security Foundations Workshop - CSFW'05, Jun 2005, Aix-en-Provence/France, pp.62-76. ⟨inria-00000554⟩

Share

Metrics

Record views

186