Skip to main content
Log in

Decidability of Equivalence of Symbolic Derivations

  • Published:
Journal of Automated Reasoning Aims and scope Submit manuscript

Abstract

We give in this paper an alternative, and we believe simpler, proof of a deep result by Mathieu Baudet, namely that the equivalence of symbolic constraints is decidable for deduction systems on a finite signature modulo a subterm convergent equational theory.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Abadi, M., Fournet, C.: Mobile values, new names, and secure communication. In: Proceedings of the Principle of Programming Languages Conference, pp. 104–115 (2001)

  2. Abadi, M., Gordon, A.D.: A calculus for cryptographic protocols: the spi calculus. In: ACM Conference on Computer and Communications Security, pp. 36–47 (1997)

  3. Abadi, M., Rogaway, P.: Reconciling two views of cryptography (the computational soundness of formal encryption). J. Cryptol. 20(3), 395–395 (2007)

    Article  Google Scholar 

  4. Baudet, M.: Deciding security of protocols against off-line guessing attacks. In: Atluri, V., Meadows, C., Juels, A. (eds.) ACM Conference on Computer and Communications Security, pp. 16–25. ACM (2005)

  5. Baudet, M.: Sécurité des protocoles cryptographiques: aspects logiques et calculatoires. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France (2007)

  6. Blanchet, B.: Automatic proof of strong secrecy for security protocols. In: IEEE Symposium on Security and Privacy, pp. 86–100. IEEE Computer Society (2004)

  7. Blanchet, B., Abadi, M., Fournet, C.: Automated verification of selected equivalences for security protocols. In: LICS, pp. 331–340. IEEE Computer Society (2005)

  8. Boreale, M., De Nicola, R., Pugliese, R.: Proof techniques for cryptographic processes. In: LICS, pp. 157–166 (1999)

  9. Cheval, V. Comon-Lundh, H., Delaune, S.: Automating security analysis: symbolic equivalence of constraint systems. In: Giesl, J., Haehnle, R. (eds.) Proceedings of the 5th International Joint Conference on Automated Reasoning (IJCAR’10). Lecture Notes in Artificial Intelligence, vol. 6173, pp. 412–426. Springer, Edinburgh, Scotland, UK (2010)

    Google Scholar 

  10. Chevalier, Y., Rusinowitch, M.: Combining intruder theories. In: Caires, L., Italiano, G.F., Monteiro, L., Palamidessi, C., Yung, M. (eds.) ICALP. Lecture Notes in Computer Science, vol. 3580, pp. 639–651. Springer (2005)

  11. Chevalier, Y., Rusinowitch, M.: Compiling and securing cryptographic protocols. Inf. Process. Lett. 110(3), 116–122 (2010)

    Article  MathSciNet  MATH  Google Scholar 

  12. Comon-Lundh, H., Cortier, V.: Computational soundness of observational equivalence. In: ACM Conference on Computer and Communications Security, pp. 109–118 (2008)

  13. Cortier, V., Delaune, S.: A method for proving observational equivalence. In: Proceedings of the 22nd IEEE Computer Security Foundations Symposium (CSF’09), pp. 266–276. IEEE Computer Society Press (2009)

  14. Delaune, S., Kremer, S., Ryan, M.D.: Verifying privacy-type properties of electronic voting protocols: a taster. In: Chaum, D., Jakobsson, M., Rivest, R.L., Ryan, P.Y.A., Benaloh, J., Kutyłowski, M., Adida, B. (eds.) Towards Trustworthy Elections – New Directions in Electronic Voting. Lecture Notes in Computer Science, vol. 6000, pp. 289–309. Springer (2010)

  15. Ding, Y., Horster, P.: Undetectable on-line password guessing attacks. Oper. Syst. Rev. 29(4), 77–86 (1995)

    Article  Google Scholar 

  16. Hullot, J.-M.: Canonical forms and unification. In: Bibel, W., Kowalski, R.A. (eds.) CADE. Lecture Notes in Computer Science, vol. 87, pp. 318–334. Springer (1980)

  17. Hüttel, H.: Deciding framed bisimilarity. Presented at the INFINITY’02 workshop (2002)

  18. Lowe, G.: Breaking and fixing the needham-schroeder public-key protocol using fdr. Softw. Concepts Tools 17(3), 93–102 (1996)

    Google Scholar 

  19. Rusinowitch, M., Turuani, M.: Protocol insecurity with finite number of sessions is NP-complete. In: CSFW, pp. 174–190. IEEE Computer Society (2001)

  20. Schneier, B.: Applied Cryptography. Addison-Wesley (1996)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Michaël Rusinowitch.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Chevalier, Y., Rusinowitch, M. Decidability of Equivalence of Symbolic Derivations. J Autom Reasoning 48, 263–292 (2012). https://doi.org/10.1007/s10817-010-9199-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10817-010-9199-5

Keywords

Navigation