Skip to Main content Skip to Navigation
New interface
Conference papers

A Decision Procedure for the Verification of Security Protocols with Explicit Destructors

Stéphanie Delaune 1 Florent Jacquemard 2 
2 DAHU - Verification in databases
LSV - Laboratoire Spécification et Vérification [Cachan], Inria Saclay - Ile de France
Abstract : We present a non-deterministic polynomial time procedure to decide the problem of insecurity, in the presence of a bounded number of sessions, for cryptographic protocols containing explicit destructor symbols, like decryption and projection. These operators are axiomatized by an arbitrary convergent rewrite system satisfying some syntactic restrictions. This approach, with parameterized semantics, allows us to weaken the security hypotheses for verification, i.e. to address a larger class of attacks than for models based on free algebra. Our procedure is defined by an inference system based on basic narrowing techniques for deciding satisfiability of combinations of first-order equations and intruder deduction constraints.
Document type :
Conference papers
Complete list of metadata
Contributor : Florent Jacquemard Connect in order to contact the contributor
Submitted on : Tuesday, March 22, 2011 - 11:11:38 PM
Last modification on : Thursday, January 20, 2022 - 4:12:11 PM
Long-term archiving on: : Thursday, June 23, 2011 - 2:59:30 AM


Files produced by the author(s)


  • HAL Id : inria-00579012, version 1


Stéphanie Delaune, Florent Jacquemard. A Decision Procedure for the Verification of Security Protocols with Explicit Destructors. 11th ACM Conference on Computer and Communications Security (CCS), Oct 2004, Washington D.C., United States. pp.278-287. ⟨inria-00579012⟩



Record views


Files downloads