Privacy-type properties such as vote secrecy, anonymity, or untraceability are typically expressed using the notion of trace equivalence in a process algebra that models security protocols. In this paper, we propose some results to reduce the search space when we are looking for an attack regarding trace equivalence. Our work is strongly inspired from [10], which establishes that, if there is a witness of non trace equivalence, then there is one that is well-typed. Our main contribution is to establish a similar result for trace inclusion. Our motivation is twofolds: first, this small attack property is needed for proving soundness of the tool SatEquiv [13]. Second, we revisit the proof in order to simplify it. Specifically, we show two res...
International audienceMature push button tools have emerged for checking trace properties (e.g. secr...
International audienceSecurity protocols have been successfully analyzed using symbolic models, wher...
This paper presents APTE, a new tool for automatically proving the security of cryptographic protoco...
Privacy-type properties such as vote secrecy, anonymity, or untraceability are typically expressed u...
Abstract. Privacy properties such as untraceability, vote secrecy, or anonymity are typically expres...
International audiencePrivacy properties such as untraceability, vote secrecy, or anonymity are typi...
Our first main contribution is to reduce the search space for attacks. Specifically, we show that if...
Security properties of cryptographic protocols are typically expressed as reachability or equivalenc...
Many tools have been developed to automatically verify security properties on cryptographic protocol...
We consider security properties of cryptographic protocols that can be modeled using the notion of t...
We consider security properties of cryptographic protocols, that are either trace properties (such a...
Abstract—Privacy properties such as anonymity, unlinkability, or vote secrecy are typically expresse...
International audienceWe consider security properties of cryptographic protocols that can be modelle...
Formal methods have proved their usefulness for analysing the security of protocols. In this setting...
Abstract. Security protocols can be successfully analysed using formal meth-ods. When proving securi...
International audienceMature push button tools have emerged for checking trace properties (e.g. secr...
International audienceSecurity protocols have been successfully analyzed using symbolic models, wher...
This paper presents APTE, a new tool for automatically proving the security of cryptographic protoco...
Privacy-type properties such as vote secrecy, anonymity, or untraceability are typically expressed u...
Abstract. Privacy properties such as untraceability, vote secrecy, or anonymity are typically expres...
International audiencePrivacy properties such as untraceability, vote secrecy, or anonymity are typi...
Our first main contribution is to reduce the search space for attacks. Specifically, we show that if...
Security properties of cryptographic protocols are typically expressed as reachability or equivalenc...
Many tools have been developed to automatically verify security properties on cryptographic protocol...
We consider security properties of cryptographic protocols that can be modeled using the notion of t...
We consider security properties of cryptographic protocols, that are either trace properties (such a...
Abstract—Privacy properties such as anonymity, unlinkability, or vote secrecy are typically expresse...
International audienceWe consider security properties of cryptographic protocols that can be modelle...
Formal methods have proved their usefulness for analysing the security of protocols. In this setting...
Abstract. Security protocols can be successfully analysed using formal meth-ods. When proving securi...
International audienceMature push button tools have emerged for checking trace properties (e.g. secr...
International audienceSecurity protocols have been successfully analyzed using symbolic models, wher...
This paper presents APTE, a new tool for automatically proving the security of cryptographic protoco...