Security protocols, constraint systems, and group theories - Archive ouverte HAL Accéder directement au contenu
Communication Dans Un Congrès Année : 2012

Security protocols, constraint systems, and group theories

Résumé

When formally analyzing security protocols it is often im- portant to express properties in terms of an adversary's inability to distinguish two protocols. It has been shown that this problem amounts to deciding the equivalence of two constraint systems, i.e., whether they have the same set of solutions. In this paper we study this equivalence problem when cryptographic primitives are modeled using a group equational theory, a special case of monoidal equational theories. The results strongly rely on the isomorphism between group theories and rings. This allows us to reduce the problem under study to the problem of solving systems of equations over rings. We provide several new decidability and complexity results, notably for equational theories which have applications in security protocols, such as exclusive or and Abelian groups which may additionally admit a unary, homomorphic symbol.
Fichier principal
Vignette du fichier
CKP-ijcar12.pdf (352.15 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)
Loading...

Dates et versions

hal-00729091 , version 1 (08-10-2015)

Identifiants

Citer

Stéphanie Delaune, Steve Kremer, Daniel Pasaila. Security protocols, constraint systems, and group theories. 6th International Joint Conference on Automated Reasoning (IJCAR'12), Jun 2012, Manchester, United Kingdom. pp.164-178, ⟨10.1007/978-3-642-31365-3_15⟩. ⟨hal-00729091⟩
230 Consultations
80 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More