Only very little is known about the automatic analysis of cryptographic protocols for game-theoretic security properties. In this paper, we therefore study decidability and complexity of the model checking problem for AMC-formulas over infinite state concurrent game structures induced by cryptographic protocols and the Dolev-Yao intruder. We show that the problem is NEXPTIME-complete when making reasonable assumptions about protocols and for an expressive fragment of AMC, which contains, for example, all properties formulated by Kremer and Raskin in fair ATL for contract-signing and non-repudiation protocols. We also prove that our assumptions on protocols are necessary to obtain decidability
International audienceAfter a short introduction to the field of security protocol verification, we ...
Abstract. After a short introduction to the field of security protocol verification, we present the ...
International audienceWe address the proof-based development of cryptographic protocols satisfying s...
Abstract. Only very little is known about the automatic analysis of cryptographic protocols for game...
Abstract. This paper presents the first automatic technique for proving not only protocols but also ...
In this thesis we introduce the alternating mu-calculus (AMC) for cryptographic protocols and show i...
We present a new mechanized prover for secrecy properties of cryptographic protocols. In contrast to...
We study the problem of analysing the security for an unbounded number of concurrent sessions of a c...
Research on the automatic analysis of cryptographic protocols has so far mainly concentrated on reac...
Cryptographic protocols can be divided into (1) protocols where the protocol steps are simple from a...
We show that for infinite transition systems induced by cryptographic protocols in the Rusinowitch/T...
AbstractCryptographic protocols can be divided into (1) protocols where the protocol steps are simpl...
Abstract. Formal methods have been very successful in analyzing security pro-tocols for reachability...
AbstractWe investigate the complexity of the protocol insecurity problem for a finite number of sess...
In this paper we investigate the applicability of a bottom-up evaluation strategy for a first-order ...
International audienceAfter a short introduction to the field of security protocol verification, we ...
Abstract. After a short introduction to the field of security protocol verification, we present the ...
International audienceWe address the proof-based development of cryptographic protocols satisfying s...
Abstract. Only very little is known about the automatic analysis of cryptographic protocols for game...
Abstract. This paper presents the first automatic technique for proving not only protocols but also ...
In this thesis we introduce the alternating mu-calculus (AMC) for cryptographic protocols and show i...
We present a new mechanized prover for secrecy properties of cryptographic protocols. In contrast to...
We study the problem of analysing the security for an unbounded number of concurrent sessions of a c...
Research on the automatic analysis of cryptographic protocols has so far mainly concentrated on reac...
Cryptographic protocols can be divided into (1) protocols where the protocol steps are simple from a...
We show that for infinite transition systems induced by cryptographic protocols in the Rusinowitch/T...
AbstractCryptographic protocols can be divided into (1) protocols where the protocol steps are simpl...
Abstract. Formal methods have been very successful in analyzing security pro-tocols for reachability...
AbstractWe investigate the complexity of the protocol insecurity problem for a finite number of sess...
In this paper we investigate the applicability of a bottom-up evaluation strategy for a first-order ...
International audienceAfter a short introduction to the field of security protocol verification, we ...
Abstract. After a short introduction to the field of security protocol verification, we present the ...
International audienceWe address the proof-based development of cryptographic protocols satisfying s...