DocumentCode :
3382421
Title :
Deciding knowledge in security protocols under (many more) equational theories
Author :
Abadi, Martín ; Cortier, Véronique
Author_Institution :
Dept. of Comput. Sci., California Univ., Santa Cruz, CA, USA
fYear :
2005
fDate :
20-22 June 2005
Firstpage :
62
Lastpage :
76
Abstract :
In the analysis of security protocols, the knowledge of attackers is often described in terms of message deducibility and indistinguishability relations. In this paper, we pursue the study of these two relations. We establish general decidability theorems for both. These theorems require only loose, abstract conditions on the equational theory for messages. They subsume previous results for a syntactically defined class of theories that allows basic equations for functions such as encryption, decryption, and digital signatures. They also apply to many other useful theories, for example with blind digital signatures, homomorphic encryption, XOR, and other associative-commutative functions.
Keywords :
cryptography; decidability; message authentication; protocols; XOR; associative-commutative functions; decidability theorems; decryption; digital signatures; equational theories; homomorphic encryption; message deducibility; message equational theory; message indistinguishability; security protocols; Application software; Computer science; Computer security; Cryptographic protocols; Cryptography; Dictionaries; Digital signatures; Equations; Polynomials; Safety;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Security Foundations, 2005. CSFW-18 2005. 18th IEEE Workshop
ISSN :
1063-6900
Print_ISBN :
0-7695-2340-4
Type :
conf
DOI :
10.1109/CSFW.2005.14
Filename :
1443198
Link To Document :
بازگشت