HAL will be down for maintenance from Friday, June 10 at 4pm through Monday, June 13 at 9am. More information
Skip to Main content Skip to Navigation
Journal articles

Security properties: two agents are sufficient

Hubert Comon-Lundh 1 Véronique Cortier 2
2 CASSIS - Combination of approaches to the security of infinite states systems
FEMTO-ST - Franche-Comté Électronique Mécanique, Thermique et Optique - Sciences et Technologies (UMR 6174), Inria Nancy - Grand Est, LORIA - FM - Department of Formal Methods
Abstract : We consider an important family of cryptographic protocols and a class of security properties which encompasses secrecy and authentication. We show that it is always sufficient to consider a bounded number of agents b (b=2 for secrecy properties for example): if there is an attack involving n agents, then there is an attack involving at most b agents.
Document type :
Journal articles
Complete list of metadata

Contributor : Publications Loria Connect in order to contact the contributor
Submitted on : Tuesday, September 26, 2006 - 10:13:04 AM
Last modification on : Friday, January 21, 2022 - 3:09:05 AM


  • HAL Id : inria-00099981, version 1


Hubert Comon-Lundh, Véronique Cortier. Security properties: two agents are sufficient. Science of Computer Programming, Elsevier, 2004, 50 (1-3), pp.51-71. ⟨inria-00099981⟩



Record views