Title :
Satisfiability of general intruder constraints with a set constructor
Author :
Avanesov, Tigran ; Chevalier, Yannick ; Rusinowitch, Michaël ; Turuani, Mathieu
Author_Institution :
Loria-INRIA Grand Est, Nancy, France
Abstract :
Many decision problems on security protocols can be reduced to solving so-called intruder constraints in Dolev Yao model. Most constraint solving procedures for protocol security rely on two properties of constraint systems called monotonicity and variable-origination. In this work we relax these restrictions by giving an NP decision procedure for solving general intruder constraints (that do not have these properties). Our result extends a first work by L. Mazaré in several directions: we allow non-atomic keys, and an associative, commutative and idempotent symbol (for modeling sets). We also give several new applications of the result.
Keywords :
computability; computational complexity; cryptographic protocols; Dolev Yao model; NP decision procedure; general intruder constraint satisfiability; monotonicity properties; nonatomic keys; security protocols; set constructor; variable-origination properties; Communication channels; Encryption; Layout; Protocols; Public key; XML; ACI; Dolev-Yao intruder; Security; constraint solving; general constraints;
Conference_Titel :
Risks and Security of Internet and Systems (CRiSIS), 2010 Fifth International Conference on
Conference_Location :
Montreal, QC
Print_ISBN :
978-1-4244-8641-0
Electronic_ISBN :
978-1-4244-8642-7
DOI :
10.1109/CRISIS.2010.5764919