Exploiting symmetries when proving equivalence properties for security protocols

7Citations
Citations of this article
30Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Verification of privacy-type properties for cryptographic protocols in an active adversarial environment, modelled as a behavioural equivalence in concurrent-process calculi, exhibits a high computational complexity. While undecidable in general, for some classes of common cryptographic primitives the problem is coNEXP-complete when the number of honest participants is bounded. In this paper we develop optimisation techniques for verifying equivalences, exploiting symmetries between the two processes under study. We demonstrate that they provide a significant (several orders of magnitude) speed-up in practice, thus increasing the size of the protocols that can be analysed fully automatically.

Cite

CITATION STYLE

APA

Cheval, V., Kremer, S., & Rakotonirina, I. (2019). Exploiting symmetries when proving equivalence properties for security protocols. In Proceedings of the ACM Conference on Computer and Communications Security (pp. 905–922). Association for Computing Machinery. https://doi.org/10.1145/3319535.3354260

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free