Cryptographic protocol verification using tractable classes of horn clauses

Helmut Seidl, Kumar Neeraj Verma

    Research output: Contribution to journalConference articleResearchpeer-review

    Abstract

    We consider secrecy problems for cryptographic protocols modeled using Horn clauses and present general classes of Horn clauses which can be efficiently decided. Besides simplifying the methods for the class of flat and onevariable clauses introduced for modeling of protocols with single blind copying [7,25], we also generalize this class by considering k-variable clauses instead of one-variable clauses with suitable restrictions similar to those for the class S(+). This class allows to conveniently model protocols with joint blind copying. We show that for a fixed k, our new class can be decided in DEXPTIME, as in the case of one variable.
    Original languageEnglish
    Book seriesLecture Notes in Computer Science
    Volume4444
    Pages (from-to)97-119
    ISSN0302-9743
    DOIs
    Publication statusPublished - 2007
    EventSymposium on Program Analysis and Compilation, Theory and Practice. Dedicated to Reinhard Wilhelm on the Occasion of His 60th Birthday - Schloss Dagstuhl, GERMANY
    Duration: 1 Jan 2007 → …

    Conference

    ConferenceSymposium on Program Analysis and Compilation, Theory and Practice. Dedicated to Reinhard Wilhelm on the Occasion of His 60th Birthday
    CitySchloss Dagstuhl, GERMANY
    Period01/01/2007 → …

    Bibliographical note

    ISBN: 978-3-540-71315-9 (Book in journal series)

    Fingerprint

    Dive into the research topics of 'Cryptographic protocol verification using tractable classes of horn clauses'. Together they form a unique fingerprint.

    Cite this