Abstract
We give in this paper an alternative, and we believe simpler, proof of a deep result by Mathieu Baudet, namely that the equivalence of symbolic constraints is decidable for deduction systems on a finite signature modulo a subterm convergent equational theory.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Abadi, M., Fournet, C.: Mobile values, new names, and secure communication. In: Proceedings of the Principle of Programming Languages Conference, pp. 104–115 (2001)
Abadi, M., Gordon, A.D.: A calculus for cryptographic protocols: the spi calculus. In: ACM Conference on Computer and Communications Security, pp. 36–47 (1997)
Abadi, M., Rogaway, P.: Reconciling two views of cryptography (the computational soundness of formal encryption). J. Cryptol. 20(3), 395–395 (2007)
Baudet, M.: Deciding security of protocols against off-line guessing attacks. In: Atluri, V., Meadows, C., Juels, A. (eds.) ACM Conference on Computer and Communications Security, pp. 16–25. ACM (2005)
Baudet, M.: Sécurité des protocoles cryptographiques: aspects logiques et calculatoires. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France (2007)
Blanchet, B.: Automatic proof of strong secrecy for security protocols. In: IEEE Symposium on Security and Privacy, pp. 86–100. IEEE Computer Society (2004)
Blanchet, B., Abadi, M., Fournet, C.: Automated verification of selected equivalences for security protocols. In: LICS, pp. 331–340. IEEE Computer Society (2005)
Boreale, M., De Nicola, R., Pugliese, R.: Proof techniques for cryptographic processes. In: LICS, pp. 157–166 (1999)
Cheval, V. Comon-Lundh, H., Delaune, S.: Automating security analysis: symbolic equivalence of constraint systems. In: Giesl, J., Haehnle, R. (eds.) Proceedings of the 5th International Joint Conference on Automated Reasoning (IJCAR’10). Lecture Notes in Artificial Intelligence, vol. 6173, pp. 412–426. Springer, Edinburgh, Scotland, UK (2010)
Chevalier, Y., Rusinowitch, M.: Combining intruder theories. In: Caires, L., Italiano, G.F., Monteiro, L., Palamidessi, C., Yung, M. (eds.) ICALP. Lecture Notes in Computer Science, vol. 3580, pp. 639–651. Springer (2005)
Chevalier, Y., Rusinowitch, M.: Compiling and securing cryptographic protocols. Inf. Process. Lett. 110(3), 116–122 (2010)
Comon-Lundh, H., Cortier, V.: Computational soundness of observational equivalence. In: ACM Conference on Computer and Communications Security, pp. 109–118 (2008)
Cortier, V., Delaune, S.: A method for proving observational equivalence. In: Proceedings of the 22nd IEEE Computer Security Foundations Symposium (CSF’09), pp. 266–276. IEEE Computer Society Press (2009)
Delaune, S., Kremer, S., Ryan, M.D.: Verifying privacy-type properties of electronic voting protocols: a taster. In: Chaum, D., Jakobsson, M., Rivest, R.L., Ryan, P.Y.A., Benaloh, J., Kutyłowski, M., Adida, B. (eds.) Towards Trustworthy Elections – New Directions in Electronic Voting. Lecture Notes in Computer Science, vol. 6000, pp. 289–309. Springer (2010)
Ding, Y., Horster, P.: Undetectable on-line password guessing attacks. Oper. Syst. Rev. 29(4), 77–86 (1995)
Hullot, J.-M.: Canonical forms and unification. In: Bibel, W., Kowalski, R.A. (eds.) CADE. Lecture Notes in Computer Science, vol. 87, pp. 318–334. Springer (1980)
Hüttel, H.: Deciding framed bisimilarity. Presented at the INFINITY’02 workshop (2002)
Lowe, G.: Breaking and fixing the needham-schroeder public-key protocol using fdr. Softw. Concepts Tools 17(3), 93–102 (1996)
Rusinowitch, M., Turuani, M.: Protocol insecurity with finite number of sessions is NP-complete. In: CSFW, pp. 174–190. IEEE Computer Society (2001)
Schneier, B.: Applied Cryptography. Addison-Wesley (1996)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Chevalier, Y., Rusinowitch, M. Decidability of Equivalence of Symbolic Derivations. J Autom Reasoning 48, 263–292 (2012). https://doi.org/10.1007/s10817-010-9199-5
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10817-010-9199-5