We present a name-passing calculus that can be regarded as a simplified pi-calculus equipped with a cryptographic table. The latter is a data structure representing the relationships among names. We apply the calculus to the modelling and verification of secrecy and authenticity properties in cryptographic protocols relying on symmetric shared keys. Following classical approaches [8], we formulate the verification task as a reachability problem and prove its decidability assuming finite principals and bounds on the sorts of the messages synthesized by the attacker
150 pagesModern software systems today have increasingly complex security requirements – such as sup...
. We develop principles and rules for achieving secrecy properties in security protocols. Our approa...
International audienceAfter a short introduction to the field of security protocol verification, we ...
AbstractA cryptographic protocol is a distributed program that can be executed by several actors. Si...
The paper surveys the literature on high-level name-passing process calculi, and their extensions wi...
We present a new technique for verifying authenticity in cryptographic protocols. This technique is ...
We design a core language of principals running distributed programs over a public network. Our lang...
We define and study a distributed cryptographic implementation for an asynchronous pi calculus. At t...
Abstract. This paper presents the first automatic technique for proving not only protocols but also ...
Secure two-party computation allows two mutually distrusting parties to compute a function together,...
We give an abstraction of verifiable multi-secret sharing schemes that is accessible to a fully mech...
The challenges hidden in the implementation of high-level process calculi into low-level environment...
Abstract. After a short introduction to the field of security protocol verification, we present the ...
We extend the pi-calculus and the spi-calculus with two primitives that guarantee authentication. Th...
We advocate here the use of two authentication primitives we recently propose in a calculus for dist...
150 pagesModern software systems today have increasingly complex security requirements – such as sup...
. We develop principles and rules for achieving secrecy properties in security protocols. Our approa...
International audienceAfter a short introduction to the field of security protocol verification, we ...
AbstractA cryptographic protocol is a distributed program that can be executed by several actors. Si...
The paper surveys the literature on high-level name-passing process calculi, and their extensions wi...
We present a new technique for verifying authenticity in cryptographic protocols. This technique is ...
We design a core language of principals running distributed programs over a public network. Our lang...
We define and study a distributed cryptographic implementation for an asynchronous pi calculus. At t...
Abstract. This paper presents the first automatic technique for proving not only protocols but also ...
Secure two-party computation allows two mutually distrusting parties to compute a function together,...
We give an abstraction of verifiable multi-secret sharing schemes that is accessible to a fully mech...
The challenges hidden in the implementation of high-level process calculi into low-level environment...
Abstract. After a short introduction to the field of security protocol verification, we present the ...
We extend the pi-calculus and the spi-calculus with two primitives that guarantee authentication. Th...
We advocate here the use of two authentication primitives we recently propose in a calculus for dist...
150 pagesModern software systems today have increasingly complex security requirements – such as sup...
. We develop principles and rules for achieving secrecy properties in security protocols. Our approa...
International audienceAfter a short introduction to the field of security protocol verification, we ...