Stéphanie Delaune

نویسندگان

  • Stéphanie Delaune
  • Steve Kremer
  • Mark D. Ryan
چکیده

We propose a symbolic semantics for the finite applied pi calculus.The applied pi calculus is a variant of the pi calculus with extensions formodelling cryptographic protocols. By treating inputs symbolically, oursemantics avoids potentially infinite branching of execution trees due toinputs from the environment. Correctness is maintained by associatingwith each process a set of constraints on terms. We define a symbolic la-belled bisimulation relation, which is shown to be sound but not completewith respect to standard bisimulation. We explore the lack of complete-ness and demonstrate that the symbolic bisimulation relation is sufficientfor many practical examples. This work is an important step towardsautomation of observational equivalence for the finite applied pi calculus,e.g. for verification of anonymity or strong secrecy properties. ∗This work has been partly supported by the EPSRC projects EP/E029833, VerifyingProperties in Electronic Voting Protocols and EP/E040829/1, Verifying Anonymity and Pri-vacy Properties of Security Protocols, the ARA SESUR project AVOTÉ and the ARTIST2NoE. Preliminary versions of this paper appeared in [13] and [14].

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Stéphanie Delaune , Steve Kremer and Mark D . Ryan Symbolic bisimulation for the applied pi calculus Research Report LSV - 07 - 14 April 2007

We propose a symbolic semantics for the finite applied pi calculus, which is a variant of the pi calculus with extensions for modelling cryptgraphic protocols. By treating inputs symbolically, our semantics avoids potentially infinite branching of execution trees due to inputs from the environment. Correctness is maintained by associating with each process a set of constraints on symbolic terms...

متن کامل

Stéphanie Delaune , Steve Kremer and Graham Steel Formal Analysis of

PKCS#11 defines an API for cryptographic devices that has been widely adopted in industry. However, it has been shown to be vulnerable to a variety of attacks that could, for example, compromise the sensitive keys stored on the device. In this paper, we set out a formal model of the operation of the API, which differs from previous security API models notably in that it accounts for non-monoton...

متن کامل

Stéphanie Delaune An Undecidability Result for AGh

We present an undecidability result for the verification of security protocols. Since the perfect cryptography assumption is unrealistic for cryptographic primitives with visible algebraic properties, several recent works relax this assumption, allowing the intruder to exploit these properties. We are interested in the Abelian groups theory in combination with the homomorphism axiom. We show th...

متن کامل

Results on the case studies

The results presented in this report is a summary of all the experiments that have been performed during the project on the case studies presented in [15].

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008