Dynamic tags for security protocols

From MaRDI portal
Publication:4979449

DOI10.2168/LMCS-10(2:11)2014zbMATH Open1315.94050arXiv1405.2738WikidataQ114952761 ScholiaQ114952761MaRDI QIDQ4979449FDOQ4979449


Authors: Myrto Arapinis, Stéphanie Delaune, Steve Kremer Edit this on Wikidata


Publication date: 23 June 2014

Published in: Logical Methods in Computer Science (Search for Journal in Brave)

Abstract: The design and verification of cryptographic protocols is a notoriously difficult task, even in symbolic models which take an abstract view of cryptography. This is mainly due to the fact that protocols may interact with an arbitrary attacker which yields a verification problem that has several sources of unboundedness (size of messages, number of sessions, etc. In this paper, we characterize a class of protocols for which deciding security for an unbounded number of sessions is decidable. More precisely, we present a simple transformation which maps a protocol that is secure for a bounded number of protocol sessions (a decidable problem) to a protocol that is secure for an unbounded number of sessions. The precise number of sessions that need to be considered is a function of the security property and we show that for several classical security properties a single session is sufficient. Therefore, in many cases our results yields a design strategy for security protocols: (i) design a protocol intended to be secure for a {single session}; and (ii) apply our transformation to obtain a protocol which is secure for an unbounded number of sessions.


Full work available at URL: https://arxiv.org/abs/1405.2738




Recommendations





Cited In (8)

Uses Software





This page was built for publication: Dynamic tags for security protocols

Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4979449)