Skip to main content
Log in

Unification Modulo Homomorphic Encryption

  • Published:
Journal of Automated Reasoning Aims and scope Submit manuscript

Abstract

Encryption ‘distributing over pairs’ is a technique employed in several cryptographic protocols. We show that unification is decidable for an equational theory HE specifying such an encryption. The method consists in transforming any given problem in such a way, that the resulting problem can be solved by combining a graph-based reasoning on its equations involving the homomorphisms, with a syntactic reasoning on its pairings. We show HE-unification to be NP-hard and in EXPTIME. We also indicate, briefly, how to extend HE-unification to Cap unification modulo HE, that can be used as a tool for modeling and analyzing cryptographic protocols where encryption follows the ECB mode, i.e., is done block-wise on messages.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Anantharaman, S., Narendran, P., Rusinowitch, M.: Intruders with Caps. In: Proc. of the Int. Conference RTA’07. LNCS, vol. 4533, pp. 20–35. Springer-Verlag (2007)

  2. Anantharaman, S., Lin, H., Lynch, C., Narendran, P., Rusinowitch, M.: Unification modulo homomorphic encryption. In: Proc. of Int. Conf. FROCOS 2009, TRENTO-Italy. LNAI, vol. 5749, pp. 100–116. Springer-Verlag (2009)

  3. Anantharaman, S., Lin, H., Lynch, C., Narendran, P., Rusinowitch, M.: Cap Unification: application to protocol security modulo homomorphic encryption. In: Proc. of the 5th ACM Symp. on Information, Computer and Communications Security, ASIACCS’10, pp. 192–203. ACM, New York (2010)

    Google Scholar 

  4. Baader, F., Nipkow, T.: Term Rewriting and All That. Cambridge University Press, New York (1998)

    Google Scholar 

  5. Baudet, M.: Deciding security of protocols against off-line guessing attacks. In: Proc. of the 12th ACM Conf. on Computer and Comm. Security, CCS’05, pp. 16–25. ACM, New York (2005)

    Chapter  Google Scholar 

  6. Comon-Lundh, H., Treinen, R.: Easy intruder deductions. Verification: theory and practice In: LNCS 2772, pp. 225–242. Springer-Verlag (2004)

  7. Comon-Lundh, H., Shmatikov, V.: Intruder deductions, constraint solving and insecurity decision in presence of exclusive-or. In: Proc. of the Logic in Computer Science Conference, LICS’03, pp. 271–280. IEEE Computer Society Press (2003)

  8. Cortier, V., Delaune, S., Lafourcade, P.: A survey of algebraic properties used in cryptographic protocols. J. Comput. Secur. 14(1), 1–43 (2006)

    Google Scholar 

  9. Cortier, V., Rusinowitch, M., Zalinescu, E.: A resolution strategy for verifying cryptographic protocols with CBC encryption and blind signatures. In: Proc. of the 7th ACM SIGPLAN Conf., PPDP’05, pp. 12–22 (2005)

  10. Delaune, S., Jacquemard, F.: A decision procedure for the verification of security protocols with explicit destructors. In: Proc. of the 11th ACM Conference on Computer and Communications Security (CCS’04), pp. 278–287. ACM, Washington (2004)

    Chapter  Google Scholar 

  11. Kremer, S., Ryan, M.D.: Analysing the vulnerability of protocols to produce known-pair and chosen-text attacks. In: Proc. of the 2nd Int. Workshop on Security Issues in Coordination Models, Languages, and Systems (SecCo 2004), ENTCS, vol. 128, Issue 5, pp. 87–104 (2004)

  12. Lafourcade, P.: Relation between unification problem and intruder deduction problem. In: Proc. of the 3rd Int. Workshop on Security and Rewriting Techniques (SecReT’08). Pittsburgh, USA (2008)

  13. Lafourcade, P., Lugiez, D., Treinen, R.: Intruder deduction for the equational theory of Abelian groups with distributive encryption. Inf. Comput. 205(4), 581–623 (2007)

    Article  MathSciNet  MATH  Google Scholar 

  14. Millen, J., Shmatikov, V.: Constraint solving for bounded-process cryptographic protocol analysis. In: Proc. of the 8th ACM Conference on Computer and Communications Security, pp. 166–175. ACM, New York (2001)

    Chapter  Google Scholar 

  15. Narendran, P., Marshall, A., Mahapatra, B.: On the Complexity of the Tiden-Arnborg Algorithm for Unification modulo One-Sided Distributivity. Int. Workshop on Unification UNIF’2010, Edinburgh (2010)

  16. Narendran, P., Pfenning, F., Statman, R.: On the unification problem for cartesian closed categories. In: Proc. of the Logic in Computer Science Conference LICS’93, pp. 57–63 (1993)

  17. Schaefer, T.J.: The complexity of satisfiability problems. In: Proc. of the 10th Annual ACM Symposium on Theory of Computing, pp. 216–226 (1978)

  18. Tiden, E., Arnborg, S.: Unification problems with one-sided distributivity. J. Symb. Comput. 3(1–2), 183–202 (1987)

    Article  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Siva Anantharaman.

Additional information

Work supported by NSF Grants CNS-0831305 and CNS-0831209, and partially supported by the FP7-ICT-2007-1 Project no. 216471, AVANTSSAR.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Anantharaman, S., Lin, H., Lynch, C. et al. Unification Modulo Homomorphic Encryption. J Autom Reasoning 48, 135–158 (2012). https://doi.org/10.1007/s10817-010-9205-y

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10817-010-9205-y

Keywords

Navigation