A method for proving observational equivalence

被引:32
|
作者
Cortier, Veronique [1 ]
Delaune, Stephanie [2 ]
机构
[1] CNRS, LORIA, F-75700 Paris, France
[2] CNRS, INRIA, LSV, ENS, F-75700 Paris, France
来源
PROCEEDINGS OF THE 22ND IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM | 2009年
关键词
SECURITY PROTOCOLS; VERIFICATION; PROOF;
D O I
10.1109/CSF.2009.9
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Formal methods have proved their usefulness for analyzing the security of protocols. Most existing results focus on trace properties like secrecy (expressed as a reachability property) or authentication. There are however several security properties, which cannot be defined (or cannot be naturally defined) as trace properties and require the notion of observational equivalence. Typical examples are anonymity, privacy related properties or statements closer to security properties used in cryptography. In this paper, we consider the applied pi calculus and we show that for determinate processes, observational equivalence actually coincides with trace equivalence, a notion simpler to reason with. We exhibit a large class of determinate processes, called simple processes, that capture most existing protocols and cryptographic primitives. Then, for simple processes without replication nor else branch, we reduce the decidability of trace equivalence to deciding an equivalence relation introduced by M. Baudet. Altogether, this yields the first decidability result of observational equivalence for a general class of equational theories.
引用
收藏
页码:266 / +
页数:2
相关论文
共 50 条
  • [1] Proving More Observational Equivalences with ProVerif
    Cheval, Vincent
    Blanchet, Bruno
    PRINCIPLES OF SECURITY AND TRUST, POST 2013, 2013, 7796 : 226 - 246
  • [2] Proving Termination via Measure Transfer in Equivalence Checking
    Milovanovic, Dragana
    Fuhs, Carsten
    Bucev, Mario
    Kuncak, Viktor
    INTEGRATED FORMAL METHODS, IFM 2024, 2025, 15234 : 75 - 84
  • [3] Proving Optimizations Correct using Parameterized Program Equivalence
    Kundu, Sudipta
    Tatlock, Zachary
    Lerner, Sorin
    ACM SIGPLAN NOTICES, 2009, 44 (06) : 327 - 337
  • [4] Computational Soundness of Observational Equivalence
    Comon-Lundh, Hubert
    Cortier, Veronique
    CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2008, : 109 - 118
  • [5] Proving the Equivalence of Higher-Order Terms by Means of Supercompilation
    Klyuchnikov, Ilya
    Romanenko, Sergei
    PERSPECTIVES OF SYSTEMS INFORMATICS, 2010, 5947 : 193 - 205
  • [6] Exploiting Symmetries When Proving Equivalence Properties for Security Protocols
    Cheval, Vincent
    Kremer, Steve
    Rakotonirina, Itsaka
    PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 905 - 922
  • [7] Automated Symbolic Proofs of Observational Equivalence
    Basin, David
    Dreier, Jannik
    Sasse, Ralf
    CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 1144 - 1155
  • [8] A Method for Proving Unlinkability of Stateful Protocols
    Baelde, David
    Delaune, Stephanie
    Moreau, Solene
    2020 IEEE 33RD COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2020), 2020, : 169 - 183
  • [9] Gridpoint Method for Proving Combinatorial Identities
    Kmetova, Maria
    TEM JOURNAL-TECHNOLOGY EDUCATION MANAGEMENT INFORMATICS, 2022, 11 (04): : 1634 - 1639
  • [10] Stateful applied pi calculus: Observational equivalence and labelled bisimilarity
    Arapinis, Myrto
    Liu, Jia
    Ritter, Eike
    Ryan, Mark
    JOURNAL OF LOGICAL AND ALGEBRAIC METHODS IN PROGRAMMING, 2017, 89 : 95 - 149