Our first main contribution is to reduce the search space for attacks. Specifically, we show that if there is an attack then there is one that is well-typed. Our result holds for a large class of typing systems and a large class of determinate security protocols. Assuming finitely many nonces and keys, we can derive from this result that trace equivalence is decidable for an unbounded number of sessions for a class of tagged protocols, yielding one of the first decidability results for the unbounded case. As an intermediate result, we also provide a novel decision procedure in the case of a bounded number of sessions
We consider security properties of cryptographic protocols, that are either trace properties (such a...
International audienceMature push button tools have emerged for checking trace properties (e.g. secr...
International audienceVerification of privacy-type properties for cryptographic protocols in an acti...
Abstract. Privacy properties such as untraceability, vote secrecy, or anonymity are typically expres...
International audiencePrivacy properties such as untraceability, vote secrecy, or anonymity are typi...
Security properties of cryptographic protocols are typically expressed as reachability or equivalenc...
International audiencePrivacy properties such as anonymity, unlinkability, or vote secrecy are typic...
International audienceRecently, many tools have been proposed for automatically analysing, in symbol...
International audienceSecurity properties of cryptographic protocols are typically expressed as reac...
International audienceWhile the verification of security protocols has been proved to be undecidable...
We identify a new decidable class of security protocols, both for reachability and equivalence prope...
Formal methods have been very successful in analyzing security protocols for reachability properties...
The original publication is available at www.springerlink.comInternational audienceIndistinguishabil...
Indistinguishability properties are essential in formal verification of cryptographic protocols. The...
Privacy-type properties such as vote secrecy, anonymity, or untraceability are typically expressed u...
We consider security properties of cryptographic protocols, that are either trace properties (such a...
International audienceMature push button tools have emerged for checking trace properties (e.g. secr...
International audienceVerification of privacy-type properties for cryptographic protocols in an acti...
Abstract. Privacy properties such as untraceability, vote secrecy, or anonymity are typically expres...
International audiencePrivacy properties such as untraceability, vote secrecy, or anonymity are typi...
Security properties of cryptographic protocols are typically expressed as reachability or equivalenc...
International audiencePrivacy properties such as anonymity, unlinkability, or vote secrecy are typic...
International audienceRecently, many tools have been proposed for automatically analysing, in symbol...
International audienceSecurity properties of cryptographic protocols are typically expressed as reac...
International audienceWhile the verification of security protocols has been proved to be undecidable...
We identify a new decidable class of security protocols, both for reachability and equivalence prope...
Formal methods have been very successful in analyzing security protocols for reachability properties...
The original publication is available at www.springerlink.comInternational audienceIndistinguishabil...
Indistinguishability properties are essential in formal verification of cryptographic protocols. The...
Privacy-type properties such as vote secrecy, anonymity, or untraceability are typically expressed u...
We consider security properties of cryptographic protocols, that are either trace properties (such a...
International audienceMature push button tools have emerged for checking trace properties (e.g. secr...
International audienceVerification of privacy-type properties for cryptographic protocols in an acti...