Towards a Constrained-based Verification of Parameterized Cryptographic Protocols

logic based program synthesis and transformation(2008)

引用 23|浏览20
暂无评分
摘要
Although many works have been dedicated to standard pro- tocols like Needham-Schroeder very few address the more challenging class of group protocols. We present a synchronous model for group protocols, that generalizes standard protocol models by permitting un- bounded lists inside messages. In this extended model we propose a cor- rect and complete set of inference rules for checking security properties in presence of an active intruder for the class of well-tagged protocols. Our inference system generalizes the ones that are implemented in several tools for a bounded number of sessions and fixed size lists in message. In particular when applied to protocols whose specification does not con- tain unbounded lists our inference system provides a decision procedure for secrecy in the case of a fixed number of sessions.
更多
查看译文
关键词
cryptographic protocol,inference rule
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要