Abstract. Privacy properties such as untraceability, vote secrecy, or anonymity are typically expressed as behavioural equivalence in a process algebra that mod-els security protocols. In this paper, we study how to decide one particular rela-tion, namely trace equivalence, for an unbounded number of sessions. Our first main contribution is to reduce the search space for attacks. Specifically, we show that if there is an attack then there is one that is well-typed. Our result holds for a large class of typing systems and a large class of determinate secu-rity protocols. Assuming finitely many nonces and keys, we can derive from this result that trace equivalence is decidable for an unbounded number of sessions for a class of tagged protocol...
International audienceWe consider security properties of cryptographic protocols that can be modelle...
International audienceSecurity protocols have been successfully analyzed using symbolic models, wher...
Abstract. Security protocols can be successfully analysed using formal meth-ods. When proving securi...
International audiencePrivacy properties such as untraceability, vote secrecy, or anonymity are typi...
Our first main contribution is to reduce the search space for attacks. Specifically, we show that if...
International audienceSecurity properties of cryptographic protocols are typically expressed as reac...
Abstract—Privacy properties such as anonymity, unlinkability, or vote secrecy are typically expresse...
Security properties of cryptographic protocols are typically expressed as reachability or equivalenc...
Abstract. Formal methods have been very successful in analyzing security pro-tocols for reachability...
International audienceFormal methods have been very successful in analyzing security protocols for r...
Privacy-type properties such as vote secrecy, anonymity, or untraceability are typically expressed u...
International audienceFormal methods have proved their usefulness for analyzing the security of prot...
We consider security properties of cryptographic protocols that can be modeled using the notion of t...
International audienceWe consider security properties of cryptographic protocols that can be modelle...
International audienceSecurity protocols have been successfully analyzed using symbolic models, wher...
Abstract. Security protocols can be successfully analysed using formal meth-ods. When proving securi...
International audiencePrivacy properties such as untraceability, vote secrecy, or anonymity are typi...
Our first main contribution is to reduce the search space for attacks. Specifically, we show that if...
International audienceSecurity properties of cryptographic protocols are typically expressed as reac...
Abstract—Privacy properties such as anonymity, unlinkability, or vote secrecy are typically expresse...
Security properties of cryptographic protocols are typically expressed as reachability or equivalenc...
Abstract. Formal methods have been very successful in analyzing security pro-tocols for reachability...
International audienceFormal methods have been very successful in analyzing security protocols for r...
Privacy-type properties such as vote secrecy, anonymity, or untraceability are typically expressed u...
International audienceFormal methods have proved their usefulness for analyzing the security of prot...
We consider security properties of cryptographic protocols that can be modeled using the notion of t...
International audienceWe consider security properties of cryptographic protocols that can be modelle...
International audienceSecurity protocols have been successfully analyzed using symbolic models, wher...
Abstract. Security protocols can be successfully analysed using formal meth-ods. When proving securi...