Abstract:
Many decision problems on security protocols can be reduced to solving so-called intruder constraints in Dolev Yao model. Most constraint solving procedures for protocol ...Show MoreMetadata
Abstract:
Many decision problems on security protocols can be reduced to solving so-called intruder constraints in Dolev Yao model. Most constraint solving procedures for protocol security rely on two properties of constraint systems called monotonicity and variable-origination. In this work we relax these restrictions by giving an NP decision procedure for solving general intruder constraints (that do not have these properties). Our result extends a first work by L. Mazaré in several directions: we allow non-atomic keys, and an associative, commutative and idempotent symbol (for modeling sets). We also give several new applications of the result.
Published in: 2010 Fifth International Conference on Risks and Security of Internet and Systems (CRiSIS)
Date of Conference: 10-13 October 2010
Date Added to IEEE Xplore: 10 May 2011
ISBN Information: