A method for proving observational equivalence

被引:32
|
作者
Cortier, Veronique [1 ]
Delaune, Stephanie [2 ]
机构
[1] CNRS, LORIA, F-75700 Paris, France
[2] CNRS, INRIA, LSV, ENS, F-75700 Paris, France
来源
PROCEEDINGS OF THE 22ND IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM | 2009年
关键词
SECURITY PROTOCOLS; VERIFICATION; PROOF;
D O I
10.1109/CSF.2009.9
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Formal methods have proved their usefulness for analyzing the security of protocols. Most existing results focus on trace properties like secrecy (expressed as a reachability property) or authentication. There are however several security properties, which cannot be defined (or cannot be naturally defined) as trace properties and require the notion of observational equivalence. Typical examples are anonymity, privacy related properties or statements closer to security properties used in cryptography. In this paper, we consider the applied pi calculus and we show that for determinate processes, observational equivalence actually coincides with trace equivalence, a notion simpler to reason with. We exhibit a large class of determinate processes, called simple processes, that capture most existing protocols and cryptographic primitives. Then, for simple processes without replication nor else branch, we reduce the decidability of trace equivalence to deciding an equivalence relation introduced by M. Baudet. Altogether, this yields the first decidability result of observational equivalence for a general class of equational theories.
引用
收藏
页码:266 / +
页数:2
相关论文
共 50 条
  • [31] A technique for proving decidability of containment and equivalence of linear constraint queries
    Ibarra, OH
    Su, JW
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 1999, 59 (01) : 1 - 28
  • [32] Exploiting Symmetries When Proving Equivalence Properties for Security Protocols
    Cheval, Vincent
    Kremer, Steve
    Rakotonirina, Itsaka
    PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 905 - 922
  • [33] SPES: A Symbolic Approach to Proving Query Equivalence Under Bag Semantics
    Zhou, Qi
    Arulraj, Joy
    Navathe, Shamkant B.
    Harris, William
    Wu, Jinpeng
    2022 IEEE 38TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2022), 2022, : 2735 - 2748
  • [34] Observational Equivalence Technique in Trusted Model
    Yang Jie
    Qi De-yu
    Zhou Yu-ren
    Zheng Jin-bin
    2009 IITA INTERNATIONAL CONFERENCE ON SERVICES SCIENCE, MANAGEMENT AND ENGINEERING, PROCEEDINGS, 2009, : 128 - +
  • [35] Automated Symbolic Proofs of Observational Equivalence
    Basin, David
    Dreier, Jannik
    Sasse, Ralf
    CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 1144 - 1155
  • [36] PRIOR INFORMATION AND THE OBSERVATIONAL EQUIVALENCE PROBLEM
    WEBER, WE
    JOURNAL OF POLITICAL ECONOMY, 1981, 89 (02) : 411 - 415
  • [37] Misinformation, observational equivalence and the possibility of rationality
    van Doorn, Maarten
    PHILOSOPHICAL PSYCHOLOGY, 2024,
  • [38] Linking Algebraic Observational Equivalence and Bisimulation
    Berrima, Mouhebeddine
    Ben Rajeb, Narjes
    DEVELOPMENTS IN LANGUAGE THEORY, 2010, 6224 : 76 - +
  • [39] Proving Equivalence Between Imperative and MapReduce Implementations Using Program Transformations
    Beckert, Bernhard
    Bingmann, Timo
    Kiefer, Moritz
    Sanders, Peter
    Ulbrich, Mattias
    Weigl, Alexander
    ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2018, (268): : 185 - 199
  • [40] Hypernet Semantics and Robust Observational Equivalence
    Muroya, Koko
    COALGEBRAIC METHODS IN COMPUTER SCIENCE, CMCS 2020, 2020, 12094 : XIII - XIV