title = { Intruder Deduction for {AC}-like Equational Theories with Homomorphisms },
    author = {Lafourcade, Pascal and Lugiez, Denis and Treinen, Ralf},
    month = {apr},
    year = {2005},
    booktitle = {{P}roceedings of the 16th {I}nternational {C}onference on {R}ewriting {T}echniques and {A}pplications ({RTA}'05)},
    address = {Nara, Japan},
    note = {31/79},
    pages = {308-322},
    publisher = {Springer},
    series = {Lecture Notes in Computer Science},
    volume = {3467},
    team = {other},
    abstract = {Cryptographic protocols are small programs which involve a high level of concurrency and which are difficult to analyze by hand. The most successful methods to verify such protocols rely on rewriting techniques and automated deduction in order to implement or mimic the process calculus describing the protocol execution. \par We focus on the intruder deduction problem, that is the vulnerability to passive attacks, in presence of several variants of \textit{AC}-like axioms (from \textit{AC} to Abelian groups, including the theory of \emph{exclusive or}) and homomorphism which are the most frequent axioms arising in cryptographic protocols. Solutions are known for the cases of \emph{exclusive or}, of Abelian groups, and of homomorphism alone. In this paper we address the combination of these \textit{AC}-like theories with the law of homomorphism which leads to much more complex decision problems. \par We prove decidability of the intruder deduction problem in all cases considered. Our decision procedure is in EXPTIME, except for a restricted case in which we have been able to get a PTIME decision procedure using a property of one-counter and pushdown automata.},


Contact | Site Map | Site powered by SPIP 4.2.13 + AHUNTSIC [CC License]

info visites 4005833