메뉴 건너뛰기




Volumn 18, Issue 6, 2010, Pages 1247-1299

Finite models for formal security proofs

Author keywords

Dolev Yao model; finite model; formal security proof; H 1; inductionless induction; tree automaton

Indexed keywords

DOLEV-YAO MODEL; FINITE MODEL; FORMAL SECURITY; H-1; INDUCTIONLESS INDUCTION; TREE AUTOMATA;

EID: 77957127463     PISSN: 0926227X     EISSN: None     Source Type: Journal    
DOI: 10.3233/JCS-2009-0395     Document Type: Article
Times cited : (12)

References (86)
  • 1
    • 0001772130 scopus 로고    scopus 로고
    • Secrecy by typing in security protocols
    • M. Abadi, Secrecy by typing in security protocols, Journal of the ACM 46(5) (1999), 749-786.
    • (1999) Journal of the ACM , vol.46 , Issue.5 , pp. 749-786
    • Abadi, M.1
  • 2
    • 23144463868 scopus 로고    scopus 로고
    • Analyzing security protocols with secrecy types and logic programs
    • M. Abadi and B. Blanchet, Analyzing security protocols with secrecy types and logic programs, Journal of the ACM 52(1) (2005), 102-146.
    • (2005) Journal of the ACM , vol.52 , Issue.1 , pp. 102-146
    • Abadi, M.1    Blanchet, B.2
  • 3
    • 0035035153 scopus 로고    scopus 로고
    • Mobile values, new names, and secure communication
    • M. Abadi and C. Fournet, Mobile values, new names, and secure communication, SIGPLAN Notices 36(3) (2001), 104-115.
    • (2001) SIGPLAN notices , vol.36 , Issue.3 , pp. 104-115
    • Abadi, M.1    Fournet, C.2
  • 4
    • 0003092378 scopus 로고    scopus 로고
    • A calculus for cryptographic protocols
    • M. Abadi and A.D. Gordon, A calculus for cryptographic protocols, Information and Computation 148(1) (1999), 1-70.
    • (1999) Information and Computation , vol.148 , Issue.1 , pp. 1-70
    • Abadi, M.1    Gordon, A.D.2
  • 6
    • 84874678490 scopus 로고    scopus 로고
    • On name generation and set-based analysis in the dolev-yao model
    • Brno, Czeck Re-publik, Lecture Notes in Computer Science Springer-Verlag
    • R. Amadio and W. Charatonik, On name generation and set-based analysis in the Dolev-Yao model, in: Proc. 13th International Conference on Concurrency Theory (CONCUR'02), Brno, Czeck Re-publik, Lecture Notes in Computer Science, Vol. 2421, Springer-Verlag, 2002, pp. 499-514.
    • (2002) Proc. 13th International Conference on Concurrency Theory (CONCUR'02) , vol.2421 , pp. 499-514
    • Amadio, R.1    Charatonik, W.2
  • 8
    • 0009858375 scopus 로고    scopus 로고
    • Resolution theorem proving
    • J.A. Robinson and A. Voronkov, eds, North-Holland, Amsterdam
    • L. Bachmair and H. Ganzinger, Resolution theorem proving, in: Handbook of Automated Reasoning, J.A. Robinson and A. Voronkov, eds, North-Holland, Amsterdam, 2001, pp. 19-99.
    • (2001) Handbook of Automated Reasoning , pp. 19-99
    • Bachmair, L.1    Ganzinger, H.2
  • 11
    • 0026850091 scopus 로고
    • Encrypted key exchange: Password-based protocols secure against dictionary attacks
    • Oakland, CA, May IEEE Computer Society Press, 1992
    • S.M. Bellovin and M. Merritt, Encrypted key exchange: Password-based protocols secure against dictionary attacks, in: Proc. 13th IEEE Symp. Research in Security and Privacy (S&P'93), Oakland, CA, May 1992, IEEE Computer Society Press, 1992, pp. 72-84.
    • (1992) Proc. 13th IEEE Symp. Research in Security and Privacy (S&P'93) , pp. 72-84
    • Bellovin, S.M.1    Merritt, M.2
  • 14
    • 0034822279 scopus 로고    scopus 로고
    • An efficient cryptographic protocol verifier based on prolog rules
    • Cape Breton, NS, Canada, IEEE Computer Society Press
    • B. Blanchet, An efficient cryptographic protocol verifier based on prolog rules, in: Proc. 14th IEEE Computer Security Foundations Workshop (CSFW'01), Cape Breton, NS, Canada, IEEE Computer Society Press, 2001, pp. 82-96.
    • (2001) Proc. 14th IEEE Computer Security Foundations Workshop (CSFW'01) , pp. 82-96
    • Blanchet, B.1
  • 15
    • 77957125845 scopus 로고    scopus 로고
    • An automatic security protocol verifier based on resolution theorem proving (invited tutorial)
    • Tallinn, Estonia, July R. Nieuwenhuis, ed., LNAI Springer-Verlag, 2005
    • B. Blanchet, An automatic security protocol verifier based on resolution theorem proving (invited tutorial), in: Proc. 20th International Conference on Automated Deduction (CADE-20), Tallinn, Estonia, July 2005, R. Nieuwenhuis, ed., LNAI, Vol. 3632, Springer-Verlag, 2005.
    • (2005) Proc. 20th International Conference on Automated Deduction (CADE-20) , vol.3632
    • Blanchet, B.1
  • 21
    • 21144453149 scopus 로고    scopus 로고
    • New techniques that improve MACE-style finite model building
    • P. Baumgartner, ed., Miami, FL, July
    • K. Claessen and N. Sörensson, New techniques that improve MACE-style finite model building, in: Proc. CADE-19 Workshop W4, P. Baumgartner, ed., Miami, FL, July 2003.
    • (2003) Proc. CADE-19 Workshop W4
    • Claessen, K.1    Sörensson, N.2
  • 23
    • 12744255876 scopus 로고
    • Negation as failure
    • M.L. Ginsberg, ed., Morgan Kaufmann Publishers, San Francisco, CA
    • K.L. Clark, Negation as failure, in: Readings in Nonmonotonic Reasoning, M.L. Ginsberg, ed., Morgan Kaufmann Publishers, San Francisco, CA, 1987, pp. 311-325.
    • (1987) Readings in nonmonotonic Reasoning , pp. 311-325
    • Clark, K.L.1
  • 24
    • 4243144450 scopus 로고    scopus 로고
    • Inductionless induction
    • J.A. Robinson and A. Voronkov, eds, North-Holland, Amsterdam
    • H. Comon, Inductionless induction, in: Handbook of Automated Reasoning, J.A. Robinson and A. Voronkov, eds, North-Holland, Amsterdam, 2001, pp. 913-962.
    • (2001) Handbook of Automated Reasoning , pp. 913-962
    • Comon, H.1
  • 26
    • 0034713209 scopus 로고    scopus 로고
    • Induction = i-axiomatization + first-order consistency
    • H. Comon and R. Nieuwenhuis, Induction = i-axiomatization + first-order consistency, Information and Computation 159(1,2) (2000), 151-186.
    • (2000) Information and Computation , vol.159 , Issue.1-2 , pp. 151-186
    • Comon, H.1    Nieuwenhuis, R.2
  • 27
    • 1442311384 scopus 로고    scopus 로고
    • Security properties: Two agents are sufficient
    • H. Comon-Lundh and V. Cortier, Security properties: Two agents are sufficient, Science of Computer Programming 50(1-3) (2004), 51-71.
    • (2004) Science of Computer Programming , vol.50 , Issue.1-3 , pp. 51-71
    • Comon-Lundh, H.1    Cortier, V.2
  • 29
    • 31744441853 scopus 로고    scopus 로고
    • A survey of algebraic properties used in cryptographic protocols
    • V. Cortier, S. Delaune and P. Lafourcade, A survey of algebraic properties used in cryptographic protocols, Journal of Computer Security 14(1) (2006), 1-43.
    • (2006) Journal of Computer Security , vol.14 , Issue.1 , pp. 1-43
    • Cortier, V.1    Delaune, S.2    Lafourcade, P.3
  • 32
    • 38049033340 scopus 로고    scopus 로고
    • Model-checking first-order logic: Automata and locality
    • J. Duparc and T.A. Henzinger, eds, Lausanne, Switzerland, September Lecture Notes in Computer Science Springer-Verlag, 2007
    • A. Dawar, Model-checking first-order logic: Automata and locality, in: Proc. 21st International Workshop on Computer Science Logic, 16th Annual Conference of the EACSL (CSL'07), J. Duparc and T.A. Henzinger, eds, Lausanne, Switzerland, September 2007, Lecture Notes in Computer Science, Vol. 4646, Springer-Verlag, 2007, p. 6.
    • (2007) Proc. 21st International Workshop on Computer Science Logic, 16th Annual Conference of the EACSL (CSL'07) , vol.4646 , pp. 6
    • Dawar, A.1
  • 33
    • 84976665942 scopus 로고
    • Timestamps in key distribution protocols
    • D.E. Denning and G.M. Sacco, Timestamps in key distribution protocols, Communications of the ACM 24(8) (1981), 533-536.
    • (1981) Communications of the ACM , vol.24 , Issue.8 , pp. 533-536
    • Denning, D.E.1    Sacco, G.M.2
  • 39
    • 0002783180 scopus 로고
    • Using one-way functions for authentication
    • L. Gong, Using one-way functions for authentication, Computer Communication Review 19(5) (1989), 8-11.
    • (1989) Computer Communication Review , vol.19 , Issue.5 , pp. 8-11
    • Gong, L.1
  • 40
    • 77957138523 scopus 로고    scopus 로고
    • LSV, ENS Cachan, CNRS, INRIA project SECSI available at
    • J. Goubault-Larrecq, The h1 Tool Suite, LSV, ENS Cachan, CNRS, INRIA project SECSI, 2003, available at: http://www.lsv.ens-cachan.fr/ goubault/H1.dist/dh1index.html.
    • (2003) The H1 Tool Suite
    • Goubault-Larrecq, J.1
  • 41
    • 20144382303 scopus 로고    scopus 로고
    • Une fois qu'on n'a pas trouvé de preuve, comment le faire comprendre à un assistant de preuve?
    • V. Ménissier-Morain, ed., INRIA, Sainte-Marie-de-Ré, France, January (invited paper)
    • J. Goubault-Larrecq, Une fois qu'on n'a pas trouvé de preuve, comment le faire comprendre à un assistant de preuve?, in: Actes des 15èmes Journées Francophones sur les Langages Applicatifs (JFLA'04), V. Ménissier-Morain, ed., INRIA, Sainte-Marie-de-Ré, France, January 2004, pp. 1-40 (invited paper).
    • (2004) Actes des 15èmes Journées Francophones sur les Langages Applicatifs (JFLA'04) , pp. 1-40
    • Goubault-Larrecq, J.1
  • 43
    • 51749115322 scopus 로고    scopus 로고
    • Towards producing formally checkable security proofs, automatically
    • Pittsburg, PA, USA, IEEE Computer Society Press
    • J. Goubault-Larrecq, Towards producing formally checkable security proofs, automatically, in: Proc. 21st IEEE Computer Security Foundations Symposium (CSF'08), Pittsburg, PA, USA, IEEE Computer Society Press, 2008, pp. 224-238.
    • (2008) Proc. 21st IEEE Computer Security Foundations Symposium (CSF'08) , pp. 224-238
    • Goubault-Larrecq, J.1
  • 45
    • 20144373910 scopus 로고    scopus 로고
    • Abstraction and resolution modulo AC: How to verify diffie-hellman-like protocols automatically
    • J. Goubault-Larrecq, M. Roger and K.N. Verma, Abstraction and resolution modulo AC: How to verify Diffie-Hellman-like protocols automatically, Journal of Logic and Algebraic Programming 64(2) (2005), 219-251.
    • (2005) Journal of Logic and Algebraic Programming , vol.64 , Issue.2 , pp. 219-251
    • Goubault-Larrecq, J.1    Roger, M.2    Verma, K.N.3
  • 47
    • 84947422974 scopus 로고
    • A simple model for quotient types
    • Edinburgh, UK, April M. Dezani-Ciancaglini and G.D. Plotkin, eds, Lecture Notes in Computer Science Springer-Verlag
    • M. Hofmann, A simple model for quotient types, in: Proc. 2nd Intl. Conf. Typed Lambda Calculi and Applications (TLCA'95), Edinburgh, UK, April 1995, M. Dezani-Ciancaglini and G.D. Plotkin, eds, Lecture Notes in Computer Science, Vol. 902, Springer-Verlag, pp. 216-234.
    • (1995) Proc. 2nd Intl. Conf. Typed Lambda Calculi and Applications (TLCA'95) , vol.902 , pp. 216-234
    • Hofmann, M.1
  • 48
    • 33750159684 scopus 로고    scopus 로고
    • Quotient types
    • R.J. Boulton and P.B. Jackson, eds, Number EDI-INF-RR-0046 in Informatics Report Series, Division of Informatics, University of Edinburgh, September available at
    • P.V. Homeier, Quotient types, in: Supplemental Proceedings, 14th International Conference on Theorem Proving in Higher Order Logics (TPHOLs'01), R.J. Boulton and P.B. Jackson, eds, Number EDI-INF-RR-0046 in Informatics Report Series, Division of Informatics, University of Edinburgh, September 2001, pp. 191-206, available at: http://www.inf.ed.ac.uk/publications/report/0046.html.
    • (2001) Supplemental Proceedings, 14th International Conference on Theorem Proving in Higher Order Logics (TPHOLs'01) , pp. 191-206
    • Homeier, P.V.1
  • 51
    • 34548154019 scopus 로고    scopus 로고
    • Relating the symbolic and computational models of security protocols using hashes
    • P. Degano, R. Küsters, L. Viganò and S. Zdancewic, eds, Seattle, Washington, USA, August available at
    • R. Janvier, Y. Lakhnech and L. Mazaré, Relating the symbolic and computational models of security protocols using hashes, in: Proc. Joint Workshop on Foundations of Computer Security and Automated Reasoning for Security Protocol Analysis (FCS-ARSPA'06), P. Degano, R. Küsters, L. Viganò and S. Zdancewic, eds, Seattle, Washington, USA, August 2006, pp. 67-89, available at: http://www.easychair.org/FLoC-06/fcs-arspa06.pdf.
    • (2006) Proc. Joint Workshop on Foundations of Computer Security and Automated Reasoning for Security Protocol Analysis (FCS-ARSPA'06) , pp. 67-89
    • Janvier, R.1    Lakhnech, Y.2    Mazaré, L.3
  • 52
    • 0038824488 scopus 로고
    • An efficient and secure authentication protocol using uncertified keys
    • I.L.K. Kao and R. Chow, An efficient and secure authentication protocol using uncertified keys, Operating Systems Review 29(3) (1995), 14-21.
    • (1995) Operating Systems Review , vol.29 , Issue.3 , pp. 14-21
    • Kao, I.L.K.1    Chow, R.2
  • 56
    • 41549153251 scopus 로고    scopus 로고
    • Computational soundness of equational theories (tutorial)
    • Sophia-Antipolis, France, G. Barthe and C. Fournet, eds, Lecture Notes in Computer Science Springer-Verlag
    • S. Kremer, Computational soundness of equational theories (tutorial), in: Proc. 3rd Symposium on Trustworthy Global Computing (TGC'07), Sophia-Antipolis, France, G. Barthe and C. Fournet, eds, Lecture Notes in Computer Science, Vol. 4912, Springer-Verlag, 2008, pp. 363-382.
    • (2008) Proc. 3rd Symposium on Trustworthy Global Computing (TGC'07) , vol.4912 , pp. 363-382
    • Kremer, S.1
  • 57
    • 35548966087 scopus 로고    scopus 로고
    • On the automatic analysis of recursive security protocols with XOR
    • Aachen, Germany, W. Thomas and P. Weil, eds, Lecture Notes in Computer Science Springer-Verlag
    • R. Küsters and T. Trudering, On the automatic analysis of recursive security protocols with XOR, in: Proc. 24th Symposium on Theoretical Aspects of Computer Science (STACS'2007), Aachen, Germany, W. Thomas and P. Weil, eds, Lecture Notes in Computer Science, Vol. 4393, Springer-Verlag, 2007, pp. 646-657.
    • (2007) Proc. 24th Symposium on Theoretical Aspects of Computer Science (STACS'2007) , vol.4393 , pp. 646-657
    • Küsters, R.1    Trudering, T.2
  • 58
    • 33750022021 scopus 로고
    • A simple explanation of inductionless induction
    • Louisiana State University
    • D.S. Lankford, A simple explanation of inductionless induction, Technical Report MTP-14, Math. Dept., Louisiana State University, 1981.
    • (1981) Technical Report MTP-14, Math. Dept.
    • Lankford, D.S.1
  • 59
    • 28144456308 scopus 로고    scopus 로고
    • An attack on the needham-schroeder public-key authentication protocol
    • G. Lowe, An attack on the Needham-Schroeder public-key authentication protocol, Information Processing Letters 56(3) (1996), 131-133.
    • (1996) Information Processing Letters , vol.56 , Issue.3 , pp. 131-133
    • Lowe, G.1
  • 64
    • 35048899313 scopus 로고    scopus 로고
    • Soundness of formal encryption in the presence of active adversaries
    • Cambridge, MA, February M. Naor, ed., Lecture Notes in Computer Science Springer-Verlag, 2004
    • D. Micciancio and B. Warinschi, Soundness of formal encryption in the presence of active adversaries, in: Proc. 1st IACR Theory of Cryptography Conference (TCC'04), Cambridge, MA, February 2004, M. Naor, ed., Lecture Notes in Computer Science, Vol. 2951, Springer-Verlag, 2004, pp. 133-151.
    • (2004) Proc. 1st IACR Theory of Cryptography Conference (TCC'04) , vol.2951 , pp. 133-151
    • Micciancio, D.1    Warinschi, B.2
  • 65
    • 84957716708 scopus 로고    scopus 로고
    • Abstracting cryptographic protocols with tree automata
    • Venecia, Italy, Lecture Notes in Computer Science Springer-Verlag
    • D. Monniaux, Abstracting cryptographic protocols with tree automata, in: Proc. 6th International Static Analysis Symposium (SAS'99), Venecia, Italy, Lecture Notes in Computer Science, Vol. 1694, Springer-Verlag, 1999, pp. 149-163.
    • (1999) Proc. 6th International Static Analysis Symposium (SAS'99) , vol.1694 , pp. 149-163
    • Monniaux, D.1
  • 66
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • R.M. Needham and M.D. Schroeder, Using encryption for authentication in large networks of computers, Communications of the ACM 21(12) (1978), 993-999.
    • (1978) Communications of the ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 68
    • 84958766164 scopus 로고    scopus 로고
    • Normalizable horn clauses, strongly recognizable relations and spi
    • Madrid, Spain, Lecture Notes in Computer Science Springer-Verlag
    • F. Nielson, H.R. Nielson and H. Seidl, Normalizable Horn clauses, strongly recognizable relations and Spi, in: Proc. 9th International Static Analysis Symposium (SAS'02), Madrid, Spain, Lecture Notes in Computer Science, Vol. 2477, Springer-Verlag, 2002, pp. 20-35.
    • (2002) Proc. 9th International Static Analysis Symposium (SAS'02) , vol.2477 , pp. 20-35
    • Nielson, F.1    Nielson, H.R.2    Seidl, H.3
  • 69
    • 0023247970 scopus 로고
    • Efficient and timely mutual authentication
    • D. Otway and O. Rees, Efficient and timely mutual authentication, ACM SIGOPS Operating Systems Review 21(1) (1987), 8-10.
    • (1987) ACM SIGOPS Operating Systems Review , vol.21 , Issue.1 , pp. 8-10
    • Otway, D.1    Rees, O.2
  • 70
    • 0002089129 scopus 로고
    • Isabelle: The next 700 theorem provers
    • P. Odifreddi, ed., The APIC Series Academic Press
    • L.C. Paulson, Isabelle: The next 700 theorem provers, in: Logic and Computer Science, P. Odifreddi, ed., The APIC Series, Vol. 31, Academic Press, 1990, pp. 361-386.
    • (1990) Logic and Computer Science , vol.31 , pp. 361-386
    • Paulson, L.C.1
  • 71
    • 0030705795 scopus 로고    scopus 로고
    • Proving properties of security protocols by induction
    • IEEE Computer Society Press, Rockport, MA
    • L.C. Paulson, Proving properties of security protocols by induction, in: Proc. 10th IEEE Computer Security Foundations Workshop (CSFW'97), IEEE Computer Society Press, Rockport, MA, 1997, pp. 70-83.
    • (1997) Proc. 10th IEEE Computer Security Foundations Workshop (CSFW'97) , pp. 70-83
    • Paulson, L.C.1
  • 72
    • 0034950756 scopus 로고    scopus 로고
    • Relations between secrets: Two formal analyses of the yahalom protocol
    • L.C. Paulson, Relations between secrets: Two formal analyses of the Yahalom protocol, Journal of Computer Security 9(3) (2001), 197-216.
    • (2001) Journal of Computer Security , vol.9 , Issue.3 , pp. 197-216
    • Paulson, L.C.1
  • 74
    • 84884627542 scopus 로고    scopus 로고
    • Experiments with finite tree automata in coq
    • Edinburgh, Scotland, UK, September R.J. Boulton and P.B. Jackson, eds, Lecture Notes in Computer Science Springer-Verlag, 2001
    • X. Rival and J. Goubault-Larrecq, Experiments with finite tree automata in Coq, in: Proc. 14th International Conference on Theorem Proving in Higher Order Logics (TPHOLs'01), Edinburgh, Scotland, UK, September 2001, R.J. Boulton and P.B. Jackson, eds, Lecture Notes in Computer Science, Vol. 2152, Springer-Verlag, 2001, pp. 362-377.
    • (2001) Proc. 14th International Conference on Theorem Proving in Higher Order Logics (TPHOLs'01) , vol.2152 , pp. 362-377
    • Rival, X.1    Goubault-Larrecq, J.2
  • 75
    • 0003753345 scopus 로고    scopus 로고
    • J.A. Robinson and A. Voronkov (eds) North-Holland, Amsterdam
    • J.A. Robinson and A. Voronkov (eds), Handbook of Automated Reasoning, North-Holland, Amsterdam, 2001.
    • (2001) Handbook of Automated Reasoning
  • 76
    • 0002219322 scopus 로고    scopus 로고
    • An attack on a recursive authentication protocol: A cautionary tale
    • P.Y.A. Ryan and S.A. Schneider, An attack on a recursive authentication protocol: A cautionary tale, Information Processing Letters 65(1) (1998), 7-10.
    • (1998) Information Processing Letters , vol.65 , Issue.1 , pp. 7-10
    • Ryan, P.Y.A.1    Schneider, S.A.2
  • 83
    • 0001592091 scopus 로고    scopus 로고
    • Towards an automatic analysis of security protocols
    • Trento, Italy, July H. Ganzinger, ed., LNAI Springer-Verlag, 1999
    • C. Weidenbach, Towards an automatic analysis of security protocols, in: Proc. 16th International Conference on Automated Deduction (CADE-16), Trento, Italy, July 1999, H. Ganzinger, ed., LNAI, Vol. 1632, Springer-Verlag, 1999, pp. 378-382.
    • (1999) Proc. 16th International Conference on Automated Deduction (CADE-16) , vol.1632 , pp. 378-382
    • Weidenbach, C.1
  • 84
    • 15544363314 scopus 로고    scopus 로고
    • Combining superposition, sorts and splitting
    • J.A. Robinson and A. Voronkov, eds, North-Holland, Amsterdam
    • C. Weidenbach, Combining superposition, sorts and splitting, in: Handbook of Automated Reasoning, J.A. Robinson and A. Voronkov, eds, North-Holland, Amsterdam, 2001, pp. 1965-2013.
    • (2001) Handbook of Automated Reasoning , pp. 1965-2013
    • Weidenbach, C.1
  • 86
    • 77957140789 scopus 로고    scopus 로고
    • Part of the guide for authors of TPHOL conferences (theorem proving in higher-order logics) since 1999 available at
    • Writing for the TPHOLs community, Part of the guide for authors of TPHOL conferences (theorem proving in higher-order logics) since 1999, 1999, available at: http://www-sop.inria.fr/croap/ TPHOLs99/authors.html.
    • (1999) Writing for the TPHOLs Community


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.