Verification of randomized security protocols

被引:0
|
作者
Chadha, Rohit [1 ]
Sistla, A. Prasad [2 ]
Viswanathan, Mahesh [3 ]
机构
[1] Univ Missouri, Columbia, MO 65211 USA
[2] Univ Illinois, Chicago, IL USA
[3] Univ Illinois, Urbana, IL 61801 USA
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We consider the problem of verifying the security of finitely many sessions of a protocol that tosses coins in addition to standard cryptographic primitives against a Dolev-Yao adversary. Two properties are investigated here - secrecy, which asks if no adversary interacting with a protocol P can determine a secret sec with probability > 1 - p; and indistinguishability, which asks if the probability observing any sequence delta in P-1 is the same as that of observing (o) over bar in P-2, under the same adversary. Both secrecy and indistinguishability are known to be coNP-complete for non-randomized protocols. In contrast, we show that, for randomized protocols, secrecy and indistinguishability are both decidable in coNEXPTIME. We also prove a matching lower bound for the secrecy problem by reducing the non-satisfiability problem of monadic first order logic without equality.
引用
收藏
页数:12
相关论文
共 50 条
  • [41] A Framework for Formal Verification of Security Protocols in C plus
    Pradeep, R.
    Sunitha, N. R.
    Ravi, V
    Verma, Sushma
    INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES, ICICCT 2019, 2020, 89 : 163 - 175
  • [42] Automatic Verification for Later-Correspondence of Security Protocols
    Xie, Xiaofei
    Li, Xiaohong
    Liu, Yang
    Li, Li
    Feng, Ruitao
    Feng, Zhiyong
    STRUCTURED OBJECT-ORIENTED FORMAL LANGUAGE AND METHOD, 2015, 8979 : 111 - 126
  • [43] Formal Verification of Security Protocols: the Squirrel Prover (Keynote)
    Delaune, Stephanie
    FOUNDATIONS AND PRACTICE OF SECURITY, PT II, FPS 2023, 2024, 14552 : XI - XIV
  • [44] Formal verification: an imperative step in the design of security protocols
    Coffey, T
    Dojen, R
    Flanagan, T
    COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 2003, 43 (05): : 601 - 618
  • [45] An improved method for formal security verification of cryptographic protocols
    Watanabe, H
    Fujiwara, T
    Kasami, T
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1996, E79A (07) : 1089 - 1096
  • [46] A Formal Specification and Verification Framework for Timed Security Protocols
    Li, Li
    Sun, Jun
    Liu, Yang
    Sun, Meng
    Dong, Jin-Song
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2018, 44 (08) : 725 - 746
  • [47] AGVI - Automatic generation, verification, and implementation of security protocols
    Song, D
    Perrig, A
    Phan, D
    COMPUTER AIDED VERIFICATION, PROCEEDINGS, 2001, 2102 : 241 - 245
  • [48] Modelling and verification of layered security protocols:: A bank application
    Grünbauer, J
    Hollmann, H
    Jürjens, J
    Wimmel, G
    COMPUTER SAFETY, RELIABILITY, AND SECURITY, PROCEEDINGS, 2003, 2788 : 116 - 129
  • [49] The Scyther tool: Verification, falsification, and analysis of security protocols
    Cremers, Cas J. F.
    COMPUTER AIDED VERIFICATION, 2008, 5123 : 414 - 418
  • [50] A verification logic for security protocols based on computational semantics
    Tang, Chao-Jing, 1600, Chinese Institute of Electronics (42):