FEMTO-ST - Franche-Comté Électronique Mécanique, Thermique et Optique - Sciences et Technologies (UMR 6174), Inria Nancy - Grand Est, LORIA - FM - Department of Formal Methods
Abstract : We propose a protocol model which integrates two different ways of analyzing cryptographic protocols: i) analysis w.r.t. an unbounded number of sessions and bounded message size, and ii) analysis w.r.t. an a priori bounded number of sessions but with messages of unbounded size. We show that in this model secrecy is DEXPTIME-complete. This result is obtained by extending the Dolev-Yao intruder to simulate unbounded number of sessions.
https://hal.inria.fr/inria-00071714 Contributor : Rapport de Recherche InriaConnect in order to contact the contributor Submitted on : Tuesday, May 23, 2006 - 6:35:34 PM Last modification on : Friday, January 21, 2022 - 3:09:03 AM Long-term archiving on: : Sunday, April 4, 2010 - 8:19:15 PM