2008
DOI: 10.3233/jcs-2007-0306
|View full text |Cite
|
Sign up to set email alerts
|

Secrecy for bounded security protocols with freshness check is NEXPTIME-complete*

Abstract: The secrecy problem for security protocols is the problem to decide whether or not a given security protocol has leaky runs. In this paper, the (initial) secrecy problem for bounded protocols with freshness check is shown to be NEXPTIME-complete. Relating the formalism in this paper to the multiset rewriting (MSR) formalism we obtain that the initial secrecy problem for protocols in restricted form, with bounded length messages, bounded existentials, with or without disequality tests, and an intruder with no e… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
17
0

Year Published

2008
2008
2013
2013

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(17 citation statements)
references
References 4 publications
0
17
0
Order By: Relevance
“…In [7] was proved that the initial secrecy problem for non-well-founded protocols, with bounded length messages, unbounded number of protocol sessions, bounded existentials, disequality tests, and an intruder with existentials is undecidable. In what follows, we will prove that the open left open in [2] is undecidable, by exhibiting a reduction from the halting problem for deterministic Turing machines.…”
Section: Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…In [7] was proved that the initial secrecy problem for non-well-founded protocols, with bounded length messages, unbounded number of protocol sessions, bounded existentials, disequality tests, and an intruder with existentials is undecidable. In what follows, we will prove that the open left open in [2] is undecidable, by exhibiting a reduction from the halting problem for deterministic Turing machines.…”
Section: Resultsmentioning
confidence: 99%
“…Second, in the construction above, the main idea for which we obtain a well-founded protocol theory in restricted form is to send the encoding of Turing machine's configuration and the terms used in the uniqueness checking process, by the network predicates. In this way, we avoid using a predicate L as in [7] and thus no persistent fact are needed. Third, to simulate a transition t of M , we included two role theories in P M,w : for example R A (t) = {a t 1 , a t 2 }, trough which the current configuration of M is received and the new configuration is send, and R B (t) = {b t 1 }, which is iterated in the uniqueness checking process without violating the well-foundedness and restrictedness.…”
Section: Remark 32mentioning
confidence: 98%
See 2 more Smart Citations
“…In [7][1] several complexity results for (I)SP for bounded security protocols has been obtained. Thus, in [7] [1] was shown that (I)SP for bounded security protocols with freshness check is NEXPTIME-complete, and additionally in [1] was shown NPcompleteness of (I)SP for bounded security protocols with or without freshness check under bounded number of sessions.…”
Section: Introductionmentioning
confidence: 99%