A procedure for deciding symbolic equivalence between sets of constraint systems

Abstract : We consider security properties of cryptographic protocols that can be modeled using the notion of trace equivalence. The notion of equivalence is crucial when specifying privacy-type properties, like anonymity, vote-privacy, and unlinkability. Infinite sets of possible traces are symbolically represented using deducibility constraints. We describe an algorithm that decides trace equivalence for protocols that use standard primitives (e.g., signatures, symmetric and asymmetric encryptions) and that can be represented using such constraints. More precisely, we consider symbolic equivalence between sets of constraint systems, and we also consider disequations. Considering sets and disequations is actually crucial to decide trace equivalence for a general class of processes that may involve else branches and/or private channels (for a bounded number of sessions). Our algorithm for deciding symbolic equivalence between sets of constraint systems is implemented and performs well in practice. Unfortunately, it does not scale up well for deciding trace equivalence between processes. This is however the first implemented algorithm deciding trace equivalence on such a large class of processes.
Document type :
Journal articles
Complete list of metadatas

https://hal.archives-ouvertes.fr/hal-01906636
Contributor : Stéphanie Delaune <>
Submitted on : Saturday, October 27, 2018 - 11:06:32 AM
Last modification on : Tuesday, December 18, 2018 - 4:38:25 PM

Links full text

Identifiers

Citation

Vincent Cheval, Hubert Comon-Lundh, Stéphanie Delaune. A procedure for deciding symbolic equivalence between sets of constraint systems. Information and Computation, Elsevier, 2017, 255, pp.94 - 125. ⟨10.1016/j.ic.2017.05.004⟩. ⟨hal-01906636⟩

Share

Metrics

Record views

63