Verification of randomized security protocols

被引:0
|
作者
Chadha, Rohit [1 ]
Sistla, A. Prasad [2 ]
Viswanathan, Mahesh [3 ]
机构
[1] Univ Missouri, Columbia, MO 65211 USA
[2] Univ Illinois, Chicago, IL USA
[3] Univ Illinois, Urbana, IL 61801 USA
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We consider the problem of verifying the security of finitely many sessions of a protocol that tosses coins in addition to standard cryptographic primitives against a Dolev-Yao adversary. Two properties are investigated here - secrecy, which asks if no adversary interacting with a protocol P can determine a secret sec with probability > 1 - p; and indistinguishability, which asks if the probability observing any sequence delta in P-1 is the same as that of observing (o) over bar in P-2, under the same adversary. Both secrecy and indistinguishability are known to be coNP-complete for non-randomized protocols. In contrast, we show that, for randomized protocols, secrecy and indistinguishability are both decidable in coNEXPTIME. We also prove a matching lower bound for the secrecy problem by reducing the non-satisfiability problem of monadic first order logic without equality.
引用
收藏
页数:12
相关论文
共 50 条
  • [21] Formal Verification of Security Protocols Using Spin
    Chen, Shengbo
    Fu, Hao
    Miao, Huaikou
    2016 IEEE/ACIS 15TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE (ICIS), 2016, : 637 - 642
  • [22] Improving Automatic Verification of Security Protocols with XOR
    Chen, Xihui
    van Deursen, Ton
    Pang, Jun
    FORMAL METHODS AND SOFTWARE ENGINEERING, PROCEEDINGS, 2009, 5885 : 107 - 126
  • [23] SeVe: automatic tool for verification of security protocols
    Anh Tuan Luu
    Sun, Jun
    Liu, Yang
    Dong, Jin Song
    Li, Xiaohong
    Thanh Tho Quan
    FRONTIERS OF COMPUTER SCIENCE, 2012, 6 (01) : 57 - 75
  • [24] Integrated Specification and Verification of Security Protocols and Policies
    Frau, Simone
    Torabi-Dashti, Mohammad
    2011 IEEE 24TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2011, : 18 - 32
  • [25] Formal verification logic for hybrid security protocols
    Newe, T
    Coffey, T
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2003, 18 (01): : 17 - 25
  • [26] Security of DSA type batch verification protocols
    Li, Zichen
    Li, Zhongxian
    Yang, Yixian
    Chinese Journal of Electronics, 1999, 8 (02): : 175 - 177
  • [27] An Extended UML Method for the Verification of Security Protocols
    Shen, Gang
    Li, Xiaohong
    Feng, Ruitao
    Xu, Guangquan
    Hu, Jing
    Feng, Zhiyong
    2014 19TH INTERNATIONAL CONFERENCE ON ENGINEERING OF COMPLEX COMPUTER SYSTEMS (ICECCS 2014), 2014, : 19 - 28
  • [28] Some Remarks on Security Protocols Verification Tools
    Kurkowski, Miroslaw
    Kozakiewicz, Adam
    Siedlecka-Lamch, Olga
    INFORMATION SYSTEMS ARCHITECTURE AND TECHNOLOGY - ISAT 2016 - PT II, 2017, 522 : 65 - 75
  • [29] Security Verification for Authentication and Key Exchange Protocols
    Ota, Haruki
    Kiyomoto, Shinsaku
    Tanaka, Toshiaki
    2008 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS, VOLS 1-3, 2008, : 507 - 512
  • [30] Automated verification of selected equivalences for security protocols
    Blanchet, Bruno
    Abadi, Martin
    Fournet, Cedric
    JOURNAL OF LOGIC AND ALGEBRAIC PROGRAMMING, 2008, 75 (01): : 3 - 51