메뉴 건너뛰기




Volumn 64, Issue 2, 2005, Pages 219-251

Abstraction and resolution modulo AC: How to verify Diffie-Hellman-like protocols automatically

Author keywords

Abstract interpretation; Abstraction; Associativity; Clause; Commutativity; Completeness; Cryptographic protocols; Diffie Hellman; Key exchange; Resolution; Verification

Indexed keywords

ABSTRACTING; ALGORITHMS; COMPUTATIONAL METHODS; COMPUTER PROGRAMMING; MATHEMATICAL MODELS; OPTIMIZATION;

EID: 20144373910     PISSN: 15678326     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.jlap.2004.09.004     Document Type: Article
Times cited : (22)

References (48)
  • 1
    • 84874678490 scopus 로고    scopus 로고
    • On name generation and set-based analysis in the Dolev-Yao model
    • 13th International Conference on Concurrency Theory (CONCUR), Springer-Verlag
    • R. Amadio, and W. Charatonik On name generation and set-based analysis in the Dolev-Yao model 13th International Conference on Concurrency Theory (CONCUR) LNCS 2421 2002 Springer-Verlag 499 514
    • (2002) LNCS , vol.2421 , pp. 499-514
    • Amadio, R.1    Charatonik, W.2
  • 2
    • 0009858375 scopus 로고    scopus 로고
    • Resolution theorem proving
    • J.A. Robinson A. Voronkov North-Holland
    • L. Bachmair, and H. Ganzinger Resolution theorem proving J.A. Robinson A. Voronkov Handbook of Automated Reasoning 2001 North-Holland 19 99 (Chapter 2).
    • (2001) Handbook of Automated Reasoning , pp. 19-99
    • Bachmair, L.1    Ganzinger, H.2
  • 4
    • 0034822279 scopus 로고    scopus 로고
    • An efficient cryptographic protocol verifier based on Prolog rules
    • IEEE Computer Society Press
    • B. Blanchet An efficient cryptographic protocol verifier based on Prolog rules 14th IEEE Computer Security FoundationsWorkshop (CSFW-14) 2001 IEEE Computer Society Press 82 96
    • (2001) 14th IEEE Computer Security FoundationsWorkshop (CSFW-14) , pp. 82-96
    • Blanchet, B.1
  • 5
    • 35248865266 scopus 로고    scopus 로고
    • Deciding the security of protocols with Diffie-Hellman exponentiation and products in exponents
    • P. Pandya J. Radhakrishnan, 23rd Intl. Conf. Foundations of Software Technology and Theoretical Computer Science (FST & TCS), Mumbai, India, Springer-Verlag
    • Y. Chevalier, R. Küsters, M. Rusinowitch, and M. Turuani Deciding the security of protocols with Diffie-Hellman exponentiation and products in exponents P. Pandya J. Radhakrishnan 23rd Intl. Conf. Foundations of Software Technology and Theoretical Computer Science (FST & TCS), Mumbai, India LNCS 2003. Springer-Verlag
    • (2003) LNCS
    • Chevalier, Y.1    Küsters, R.2    Rusinowitch, M.3    Turuani, M.4
  • 7
    • 35248897454 scopus 로고    scopus 로고
    • Tree automata with one memory, set constraints and ping-pong protocols
    • 28th International Conference on Automata, Languages and Programming (ICALP), Springer-Verlag
    • H. Comon, V. Cortier, and J. Mitchell Tree automata with one memory, set constraints and ping-pong protocols 28th International Conference on Automata, Languages and Programming (ICALP) LNCS 2076 2001 Springer-Verlag 682 693
    • (2001) LNCS , vol.2076 , pp. 682-693
    • Comon, H.1    Cortier, V.2    Mitchell, J.3
  • 9
    • 14844290049 scopus 로고    scopus 로고
    • Is it possible to decide whether a cryptographic protocol is secure or not?
    • J. Goubault-Larrecq, Special Issue on Models and Methods for Cryptographic Protocol Verification, Instytut Ła̧ csności (Institute of Telecommunications) Warsaw, Poland
    • H. Comon, and V. Shmatikov Is it possible to decide whether a cryptographic protocol is secure or not? J. Goubault-Larrecq Journal of Telecommunications and Information Technology Special Issue on Models and Methods for Cryptographic Protocol Verification vol. 4 2002 Instytut Ła̧ csności (Institute of Telecommunications) Warsaw, Poland 3 13
    • (2002) Journal of Telecommunications and Information Technology , vol.4 , pp. 3-13
    • Comon, H.1    Shmatikov, V.2
  • 10
    • 1442267739 scopus 로고    scopus 로고
    • Security properties: Two agents are sufficient
    • LSV, ENS Cachan
    • H. Comon-Lundh, V. Cortier, Security properties: Two agents are sufficient, Research Report LSV-02-10, LSV, ENS Cachan, 2002, 26 p.
    • (2002) Research Report , vol.LSV-02-10 , pp. 26
    • Comon-Lundh, H.1    Cortier, V.2
  • 11
    • 84947780217 scopus 로고    scopus 로고
    • New decidability results for fragments of first-order logic and application to cryptographic protocols
    • R. Nieuwenhuis, 14th Intl. Conf. Rewriting Techniques and Applications (RTA), Valencia, Spain, Springer-Verlag
    • H. Comon-Lundh, and V. Cortier New decidability results for fragments of first-order logic and application to cryptographic protocols R. Nieuwenhuis 14th Intl. Conf. Rewriting Techniques and Applications (RTA), Valencia, Spain LNCS 2706 2003 Springer-Verlag 148 164
    • (2003) LNCS , vol.2706 , pp. 148-164
    • Comon-Lundh, H.1    Cortier, V.2
  • 12
    • 0042467908 scopus 로고    scopus 로고
    • Intruder deductions, constraint solving and insecurity decision in presence of exclusive or
    • P. Kolaitis IEEE Computer Society Press
    • H. Comon-Lundh, and V. Shmatikov Intruder deductions, constraint solving and insecurity decision in presence of exclusive or P. Kolaitis 18th Intl. Symp. Logic in Computer Science (LICS'03), Ottawa, Canada 2003 IEEE Computer Society Press 271 280
    • (2003) 18th Intl. Symp. Logic in Computer Science (LICS'03), Ottawa, Canada , pp. 271-280
    • Comon-Lundh, H.1    Shmatikov, V.2
  • 13
    • 0000911801 scopus 로고
    • Abstract interpretation and application to logic programs
    • P. Cousot, and R. Cousot Abstract interpretation and application to logic programs Journal of Logic Programming 13 2-3 1992 103 179 Correctversionat http://www.dmi.ens.fr/~cousot/COUSOTpapers/JLP92.shtml.
    • (1992) Journal of Logic Programming , vol.13 , Issue.2-3 , pp. 103-179
    • Cousot, P.1    Cousot, R.2
  • 15
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • D. Dolev, and A.C. Yao On the security of public key protocols IEEE Trans. Inform. Theory, IT 29 2 1983 198 208
    • (1983) IEEE Trans. Inform. Theory, IT , vol.29 , Issue.2 , pp. 198-208
    • Dolev, D.1    Yao, A.C.2
  • 16
    • 85034750377 scopus 로고
    • Associative-commutative unification
    • R.E. Shostak, 7th Int. Conf. on Automated Deduction (CADE), Napa Valley, California, US, Springer-Verlag
    • F. Fagès Associative-commutative unification R.E. Shostak 7th Int. Conf. on Automated Deduction (CADE), Napa Valley, California, US LNCS 170 1984 Springer-Verlag 194 208
    • (1984) LNCS , vol.170 , pp. 194-208
    • Fagès, F.1
  • 19
    • 84937389998 scopus 로고    scopus 로고
    • Rewriting for cryptographic protocol verification
    • 17th Int. Conf. on Automated Deduction (CADE), Pittsburgh, PA, Springer-Verlag
    • T. Genet, and F. Klay Rewriting for cryptographic protocol verification 17th Int. Conf. on Automated Deduction (CADE), Pittsburgh, PA LNAI 1831 2000 Springer-Verlag 271 290
    • (2000) LNAI , vol.1831 , pp. 271-290
    • Genet, T.1    Klay, F.2
  • 21
    • 84876354671 scopus 로고    scopus 로고
    • A method for automatic cryptographic protocol verification (extended abstract)
    • Int. Workshop on Formal Methods in Parallel Programming, Theory and Applications (FMPPTA), Springer-Verlag
    • J. Goubault-Larrecq A method for automatic cryptographic protocol verification (extended abstract) Int. Workshop on Formal Methods in Parallel Programming, Theory and Applications (FMPPTA) LNCS 1800 2000 Springer-Verlag 977 984
    • (2000) LNCS , vol.1800 , pp. 977-984
    • Goubault-Larrecq, J.1
  • 22
    • 84947786510 scopus 로고    scopus 로고
    • Higher-order positive set constraints
    • 16th Int. Workshop Computer Science Logic (CSL), Edinburgh, Scotland, Springer-Verlag
    • J. Goubault-Larrecq Higher-order positive set constraints 16th Int. Workshop Computer Science Logic (CSL), Edinburgh, Scotland LNCS 2471 2002 Springer-Verlag 473 489
    • (2002) LNCS , vol.2471 , pp. 473-489
    • Goubault-Larrecq, J.1
  • 25
    • 20144382303 scopus 로고    scopus 로고
    • Une fois qu'on n'a pas trouvé de preuve, comment le faire comprendre à un assistant de preuve?
    • V. Ménissier-Morain (Ed.) INRIA, collection didactique
    • J. Goubault-Larrecq, Une fois qu'on n'a pas trouvé de preuve, comment le faire comprendre à un assistant de preuve? in: V. Ménissier-Morain (Ed.), Actes des 12èmes Journées Francophones des Langages Applicatifs (JFLA'04), INRIA, collection didactique, 2004.
    • (2004) Actes des 12èmes Journées Francophones des Langages Applicatifs (JFLA'04)
    • Goubault-Larrecq, J.1
  • 26
    • 18944382537 scopus 로고    scopus 로고
    • Alternating two-way AC-tree automata
    • LSV
    • J. Goubault-Larrecq, K.N. Verma, Alternating two-way AC-tree automata, Research Report LSV-02-11, LSV, 2002, Available from: http://www.lsv.ens-cachan. fr/Publis/RAPPORTS_LSV/rr-lsv-2002-11.rr.ps.
    • (2002) Research Report , vol.LSV-02-11
    • Goubault-Larrecq, J.1    Verma, K.N.2
  • 27
    • 0016973778 scopus 로고
    • Resolution strategies as decision procedures
    • W.H. Joyner Jr. Resolution strategies as decision procedures J. ACM 23 3 1976 398 417
    • (1976) J. ACM , vol.23 , Issue.3 , pp. 398-417
    • Joyner Jr., W.H.1
  • 28
    • 51149098006 scopus 로고    scopus 로고
    • An E-unification algorithm for analyzing protocols that use modular exponentiation
    • R. Nieuwenhuis, 14th Intl. Conf. Rewriting Techniques and Applications (RTA), Valencia, Spain, Springer-Verlag
    • D. Kapur, P. Narendran, and L. Wang An E-unification algorithm for analyzing protocols that use modular exponentiation R. Nieuwenhuis 14th Intl. Conf. Rewriting Techniques and Applications (RTA), Valencia, Spain LNCS 2706 2003 Springer-Verlag 165 179
    • (2003) LNCS , vol.2706 , pp. 165-179
    • Kapur, D.1    Narendran, P.2    Wang, L.3
  • 29
    • 28144456308 scopus 로고    scopus 로고
    • An attack on the Needham-Schroeder public-key authentication protocol
    • G. Lowe An attack on the Needham-Schroeder public-key authentication protocol Inform. Process. Lett. 56 3 1996 131 133
    • (1996) Inform. Process. Lett. , vol.56 , Issue.3 , pp. 131-133
    • Lowe, G.1
  • 30
    • 0030084918 scopus 로고    scopus 로고
    • The NRL protocol analyzer: An overview
    • C. Meadows The NRL protocol analyzer: An overview J. Logic Program. 26 2 1996 113 131
    • (1996) J. Logic Program. , vol.26 , Issue.2 , pp. 113-131
    • Meadows, C.1
  • 31
    • 31744449198 scopus 로고    scopus 로고
    • CAPSL and MuCAPSL
    • J. Goubault-Larrecq, Special Issue on Models and Methods for Cryptographic Protocol Verification, Instytut Ła̧ csności (Institute of Telecommunications) Warsaw, Poland
    • J. Millen, and G. Denker CAPSL and MuCAPSL J. Goubault-Larrecq Journal of Telecommunications and Information Technology Special Issue on Models and Methods for Cryptographic Protocol Verification 4 2002 Instytut Ła̧ csności (Institute of Telecommunications) Warsaw, Poland 499 514
    • (2002) Journal of Telecommunications and Information Technology , vol.4 , pp. 499-514
    • Millen, J.1    Denker, G.2
  • 32
    • 84957716708 scopus 로고    scopus 로고
    • Abstracting cryptographic protocols with tree automata
    • 6th International Static Analysis Symposium (SAS'99), Springer-Verlag
    • D. Monniaux Abstracting cryptographic protocols with tree automata 6th International Static Analysis Symposium (SAS'99) LNCS 1694 1999 Springer-Verlag 149 163
    • (1999) LNCS , vol.1694 , pp. 149-163
    • Monniaux, D.1
  • 33
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • R.M. Needham, and M.D. Schroeder Using encryption for authentication in large networks of computers Commun. ACM 21 12 1978 993 999
    • (1978) Commun. ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 35
    • 0002596558 scopus 로고
    • Building in equational theories
    • G. Plotkin Building in equational theories Mach. Intell. 7 1972 73 90
    • (1972) Mach. Intell. , vol.7 , pp. 73-90
    • Plotkin, G.1
  • 36
    • 84867820806 scopus 로고    scopus 로고
    • Vampire 1.1 (system description)
    • R. Goré, A. Leitsch, T. Nipkow (Eds.) Siena, Italy, LNAI, 2083, Springer-Verlag
    • A. Riazanov, A. Voronkov, Vampire 1.1 (system description), in: R. Goré, A. Leitsch, T. Nipkow (Eds.), 1st Intl. Joint Conf. Automated Reasoning (IJCAR), Siena, Italy, LNAI, 2083, Springer-Verlag, 2001, pp. 376-380.
    • (2001) 1st Intl. Joint Conf. Automated Reasoning (IJCAR) , pp. 376-380
    • Riazanov, A.1    Voronkov, A.2
  • 39
    • 0028523063 scopus 로고
    • Haskell overloading is DEXPTIME-complete
    • H. Seidl Haskell overloading is DEXPTIME-complete Inform. Process. Lett. 52 2 1994 57 60
    • (1994) Inform. Process. Lett. , vol.52 , Issue.2 , pp. 57-60
    • Seidl, H.1
  • 40
    • 19144364839 scopus 로고    scopus 로고
    • Models for an adversary-centric protocol logic
    • J. Goubault-Larrecq, 1st Workshop on Logical Aspects of Cryptographic Protocol Verification (LACPV)
    • P. Selinger Models for an adversary-centric protocol logic J. Goubault-Larrecq 1st Workshop on Logical Aspects of Cryptographic Protocol Verification (LACPV) Electronic Notes in Theoretical Computer Science 55 1 2001 73 87
    • (2001) Electronic Notes in Theoretical Computer Science , vol.55 , Issue.1 , pp. 73-87
    • Selinger, P.1
  • 42
    • 84976741234 scopus 로고
    • A unification algorithm for associative-commutative functions
    • M.E. Stickel A unification algorithm for associative-commutative functions J. ACM 28 1981 423 434
    • (1981) J. ACM , vol.28 , pp. 423-434
    • Stickel, M.E.1
  • 44
    • 9444253566 scopus 로고    scopus 로고
    • On closure under complementation of equational tree automata for theories extending AC
    • 10th Intl. Conf. Logic for Programming, Artificial Intelligence, and Reasoning (LPAR), Almaty, Kazakhstan, Springer-Verlag
    • K.N. Verma On closure under complementation of equational tree automata for theories extending AC 10th Intl. Conf. Logic for Programming, Artificial Intelligence, and Reasoning (LPAR), Almaty, Kazakhstan LNCS 2850 2003 Springer-Verlag 183 197
    • (2003) LNCS , vol.2850 , pp. 183-197
    • Verma, K.N.1
  • 45
    • 84947774804 scopus 로고    scopus 로고
    • Two-way equational tree automata for AC-like theories: Decidability and closure properties
    • R. Nieuwenhuis, 14th Intl. Conf. Rewriting Techniques and Applications (RTA), Valencia, Spain, Springer-Verlag
    • K.N. Verma Two-way equational tree automata for AC-like theories: Decidability and closure properties R. Nieuwenhuis 14th Intl. Conf. Rewriting Techniques and Applications (RTA), Valencia, Spain LNCS 2706 2003 Springer-Verlag 180 196
    • (2003) LNCS , vol.2706 , pp. 180-196
    • Verma, K.N.1
  • 46
    • 0002848701 scopus 로고    scopus 로고
    • Algorithms, datastructures, and other issues in efficient automated deduction
    • R. Goré A. Leitsch T. Nipkow, 1st Intl. Joint Conf. Automated Reasoning (IJCAR), Siena, Italy, Springer-Verlag
    • A. Voronkov Algorithms, datastructures, and other issues in efficient automated deduction R. Goré A. Leitsch T. Nipkow 1st Intl. Joint Conf. Automated Reasoning (IJCAR), Siena, Italy LNAI 2083 2001 Springer-Verlag 13 28
    • (2001) LNAI , vol.2083 , pp. 13-28
    • Voronkov, A.1
  • 47
    • 84957639842 scopus 로고    scopus 로고
    • Towards an automatic analysis of security protocols
    • H. Ganzin, 16th Int. Conf. on Automated Deduction (CADE), Springer-Verlag
    • C. Weidenbach Towards an automatic analysis of security protocols H. Ganzin 16th Int. Conf. on Automated Deduction (CADE) LNAI 1632 1999 Springer-Verlag 378 382
    • (1999) LNAI , vol.1632 , pp. 378-382
    • Weidenbach, C.1
  • 48
    • 15544363314 scopus 로고    scopus 로고
    • Combining superposition, sorts and splitting
    • J.A. Robinson A. Voronkov North-Holland
    • C. Weidenbach Combining superposition, sorts and splitting J.A. Robinson A. Voronkov Handbook of Automated Reasoning, vol. II 2001 North-Holland 1965 2013 Chapter 27
    • (2001) Handbook of Automated Reasoning, Vol. II , pp. 1965-2013
    • Weidenbach, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.