Verification of randomized security protocols

被引:0
|
作者
Chadha, Rohit [1 ]
Sistla, A. Prasad [2 ]
Viswanathan, Mahesh [3 ]
机构
[1] Univ Missouri, Columbia, MO 65211 USA
[2] Univ Illinois, Chicago, IL USA
[3] Univ Illinois, Urbana, IL 61801 USA
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We consider the problem of verifying the security of finitely many sessions of a protocol that tosses coins in addition to standard cryptographic primitives against a Dolev-Yao adversary. Two properties are investigated here - secrecy, which asks if no adversary interacting with a protocol P can determine a secret sec with probability > 1 - p; and indistinguishability, which asks if the probability observing any sequence delta in P-1 is the same as that of observing (o) over bar in P-2, under the same adversary. Both secrecy and indistinguishability are known to be coNP-complete for non-randomized protocols. In contrast, we show that, for randomized protocols, secrecy and indistinguishability are both decidable in coNEXPTIME. We also prove a matching lower bound for the secrecy problem by reducing the non-satisfiability problem of monadic first order logic without equality.
引用
收藏
页数:12
相关论文
共 50 条
  • [1] Verification of Security Protocols
    Cortier, Veronique
    VERIFICATION, MODEL CHECKING, AND ABSTRACT INTERPRETATION, 2009, 5403 : 5 - 13
  • [2] Generic verification of security protocols
    Khan, AS
    Mukund, M
    Suresh, SP
    MODEL CHECKING SOFTWARE, PROCEEDINGS, 2005, 3639 : 221 - 235
  • [3] Automated Verification of Accountability in Security Protocols
    Kuennemann, Robert
    Esiyok, Ilkan
    Backes, Michael
    2019 IEEE 32ND COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2019), 2019, : 397 - 413
  • [4] A Modeling and Verification Framework for Security Protocols
    Lilli, Mario
    RIGOROUS STATE-BASED METHODS, ABZ 2021, 2021, 12709 : 158 - 161
  • [5] Automatic Verification of Simulatability in Security Protocols
    Araragi, Tadashi
    Pereira, Olivier
    FOURTH INTERNATIONAL SYMPOSIUM ON INFORMATION ASSURANCE AND SECURITY, PROCEEDINGS, 2008, : 275 - +
  • [6] AnBx - Security Protocols Design and Verification
    Bugliesi, Michele
    Modesti, Paolo
    AUTOMATED REASONING FOR SECURITY PROTOCOL ANALYSIS AND ISSUES IN THE THEORY OF SECURITY, 2010, 6186 : 164 - 184
  • [7] Automatic verification of correspondences for security protocols
    Blanchet, Bruno
    JOURNAL OF COMPUTER SECURITY, 2009, 17 (04) : 363 - 434
  • [8] Formal automatic verification of security protocols
    Xiao, Meihua
    Xue, Jinyun
    2006 IEEE INTERNATIONAL CONFERENCE ON GRANULAR COMPUTING, 2006, : 566 - +
  • [9] Challenges in the automated verification of security protocols
    Comon-Lundh, Hubert
    AUTOMATED REASONING, PROCEEDINGS, 2008, 5195 : 396 - 409
  • [10] Complexity of Security Protocols Verification Tools
    Mazur, Michal
    Kurkowski, Miroslaw
    2019 IEEE 15TH INTERNATIONAL SCIENTIFIC CONFERENCE ON INFORMATICS (INFORMATICS 2019), 2019, : 403 - 408