Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security 2014
DOI: 10.1145/2660267.2660276
|View full text |Cite
|
Sign up to set email alerts
|

A Computationally Complete Symbolic Attacker for Equivalence Properties

Abstract: International audienceWe consider the problem of computational indistinguishability of protocols. We design a symbolic model, amenable to automated deduction, such that a successful inconsistency proof implies computational indistinguishability. Conversely, symbolic models of distinguishability provide clues for likely computational attacks. We follow the idea we introduced earlier for reachability properties, axiomatizing what an attacker cannot violate. This results a computationally complete symbolic attack… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

2
106
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 32 publications
(119 citation statements)
references
References 27 publications
2
106
0
Order By: Relevance
“…We limit our attention in this paper to their indistinguishability framework given in [8]. The CCSA framework is similar to the DY framework in the sense that explicit symbolic adversarial messages are created.…”
Section: Computationally Complete Symbolic Attacker (Ccsa)mentioning
confidence: 99%
See 4 more Smart Citations
“…We limit our attention in this paper to their indistinguishability framework given in [8]. The CCSA framework is similar to the DY framework in the sense that explicit symbolic adversarial messages are created.…”
Section: Computationally Complete Symbolic Attacker (Ccsa)mentioning
confidence: 99%
“…Hence the security formula obtained this way must be derived as a logical consequence of the axioms A using first-order inference. If the formula is derived and the axioms in A shown to be computationally sound then the protocol Π is computationally secure according to Theorem 1 in [8].…”
Section: Computationally Complete Symbolic Attacker (Ccsa)mentioning
confidence: 99%
See 3 more Smart Citations