2017
DOI: 10.1016/j.jlamp.2016.10.005
|View full text |Cite
|
Sign up to set email alerts
|

A survey of symbolic methods for establishing equivalence-based properties in cryptographic protocols

Abstract: Cryptographic protocols aim at securing communications over insecure networks such as the Internet, where dishonest users may listen to communications and interfere with them. A secure communication has a different meaning depending on the underlying application. It ranges from the confidentiality of a data to e.g. verifiability in electronic voting systems. Another example of a security notion is privacy.Formal symbolic models have proved their usefulness for analysing the security of protocols. Until quite r… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
3
1

Relationship

3
6

Authors

Journals

citations
Cited by 21 publications
(15 citation statements)
references
References 96 publications
(131 reference statements)
0
15
0
Order By: Relevance
“…The precision issue of diff-equivalence is well-known (acknowledged e.g. in [37,28,21,35]). So far, the main approach that has been developed to solve this issue consists in modifying the notion of diff-equivalence to get closer to trace equivalence.…”
Section: Introductionmentioning
confidence: 99%
“…The precision issue of diff-equivalence is well-known (acknowledged e.g. in [37,28,21,35]). So far, the main approach that has been developed to solve this issue consists in modifying the notion of diff-equivalence to get closer to trace equivalence.…”
Section: Introductionmentioning
confidence: 99%
“…Moving from trace to equivalence properties is far from being straightforward as exemplified by the research effort on equivalence these past 10 years (see e.g. [18] for a survey).…”
Section: Introductionmentioning
confidence: 99%
“…We may want compilation to preserve this "runs faster than" relation between the two program behaviors against arbitrary target contexts. Similarly, in any source context, the behaviors of P 1 and P 2 may be equal and we may want the compiler to preserve such trace equivalence [17,28,32] in arbitrary target contexts. This last criterion, which we call Robust Trace Equivalence Preservation (RTEP) in Figure 1, is interesting because in various determinate settings [27,42] it coincides with preserving observational equivalence, the security-relevant part of full abstraction (see §5).…”
Section: Robustly Preserving Relational Hyperpropertiesmentioning
confidence: 99%